Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CgpIx13Spu.exe

Overview

General Information

Sample Name:CgpIx13Spu.exe
Original Sample Name:dc586fef0d44e3b50964f916ab75a44f.exe
Analysis ID:877863
MD5:dc586fef0d44e3b50964f916ab75a44f
SHA1:d08b8281eebd2221521c333bdbb5d74aa8a92d0a
SHA256:6bac4b7f411a6895a9992b4ddce92d251dfe63c4aafab668d0c525de4eddd5f2
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • CgpIx13Spu.exe (PID: 7060 cmdline: C:\Users\user\Desktop\CgpIx13Spu.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • powershell.exe (PID: 1412 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 4028 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 3984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 2344 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • CgpIx13Spu.exe (PID: 7456 cmdline: C:\Users\user\Desktop\CgpIx13Spu.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
  • unFmnPEZpvL.exe (PID: 7336 cmdline: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • schtasks.exe (PID: 7740 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • unFmnPEZpvL.exe (PID: 7784 cmdline: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • unFmnPEZpvL.exe (PID: 7792 cmdline: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
  • dhcpmon.exe (PID: 7852 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • schtasks.exe (PID: 7916 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 7980 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "2b192589-e692-4024-abbd-8fa6959a", "Group": "Airy", "Domain1": "atelilian99.ddns.net", "Domain2": "127.0.0.1", "Port": 9387, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xff8d:$a1: NanoCore.ClientPluginHost
    • 0xff4d:$a2: NanoCore.ClientPlugin
    • 0x11ea6:$b1: get_BuilderSettings
    • 0xfda9:$b2: ClientLoaderForm.resources
    • 0x115c6:$b3: PluginCommand
    • 0xff7e:$b4: IClientAppHost
    • 0x1a3fe:$b5: GetBlockHash
    • 0x124fe:$b6: AddHostEntry
    • 0x161f1:$b7: LogClientException
    • 0x1246b:$b8: PipeExists
    • 0xffb7:$b9: IClientLoggingHost
    0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xfbb:$a1: NanoCore.ClientPluginHost
    • 0xf7e:$a2: NanoCore.ClientPlugin
    Click to see the 51 entries
    SourceRuleDescriptionAuthorStrings
    19.2.dhcpmon.exe.2db9658.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    19.2.dhcpmon.exe.2db9658.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    19.2.dhcpmon.exe.2db9658.0.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xe38:$x2: NanoCore.ClientPlugin
    • 0xe75:$x3: NanoCore.ClientPluginHost
    • 0xe5a:$i1: IClientApp
    • 0xe4e:$i2: IClientData
    • 0xe29:$i3: IClientNetwork
    • 0xec3:$i4: IClientAppHost
    • 0xe65:$i5: IClientDataHost
    • 0xeb0:$i6: IClientLoggingHost
    • 0xe8f:$i7: IClientNetworkHost
    • 0xea2:$i8: IClientUIHost
    • 0xed2:$i9: IClientNameObjectCollection
    • 0xef7:$i10: IClientReadOnlyNameObjectCollection
    • 0xe41:$s1: ClientPlugin
    • 0x177c:$s1: ClientPlugin
    • 0x1789:$s1: ClientPlugin
    • 0x11f9:$s6: get_ClientSettings
    • 0x1249:$s7: get_Connected
    19.2.dhcpmon.exe.2db9658.0.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xe75:$a1: NanoCore.ClientPluginHost
    • 0xe38:$a2: NanoCore.ClientPlugin
    • 0x120c:$b1: get_BuilderSettings
    • 0xec3:$b4: IClientAppHost
    • 0x127d:$b6: AddHostEntry
    • 0x12ec:$b7: LogClientException
    • 0x1261:$b8: PipeExists
    • 0xeb0:$b9: IClientLoggingHost
    10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    Click to see the 114 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Persistence and Installation Behavior

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\CgpIx13Spu.exe, ParentImage: C:\Users\user\Desktop\CgpIx13Spu.exe, ParentProcessId: 7060, ParentProcessName: CgpIx13Spu.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp, ProcessId: 2344, ProcessName: schtasks.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:213.152.162.181192.168.2.49387496962841753 05/30/23-06:23:12.736325
    SID:2841753
    Source Port:9387
    Destination Port:49696
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969793872025019 05/30/23-06:23:42.157295
    SID:2025019
    Source Port:49697
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969693872025019 05/30/23-06:23:12.265301
    SID:2025019
    Source Port:49696
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969593872025019 05/30/23-06:22:41.923978
    SID:2025019
    Source Port:49695
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969593872816766 05/30/23-06:22:42.804651
    SID:2816766
    Source Port:49695
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969793872816766 05/30/23-06:23:43.464776
    SID:2816766
    Source Port:49697
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:213.152.162.181192.168.2.49387496952841753 05/30/23-06:22:43.336347
    SID:2841753
    Source Port:9387
    Destination Port:49695
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2b192589-e692-4024-abbd-8fa6959a", "Group": "Airy", "Domain1": "atelilian99.ddns.net", "Domain2": "127.0.0.1", "Port": 9387, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177"}
    Source: CgpIx13Spu.exeReversingLabs: Detection: 64%
    Source: CgpIx13Spu.exeVirustotal: Detection: 54%Perma Link
    Source: atelilian99.ddns.netAvira URL Cloud: Label: malware
    Source: atelilian99.ddns.netVirustotal: Detection: 7%Perma Link
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 64%
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeReversingLabs: Detection: 64%
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR
    Source: CgpIx13Spu.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Source: CgpIx13Spu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: CgpIx13Spu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: ltlR.pdbSHA256 source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb} source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.pdbM source: CgpIx13Spu.exe, 0000000A.00000003.624498728.00000000066CC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ?\C:\Windows\dll\mscorlib.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ltlR.pdb source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 4x nop then jmp 0525CA0Bh

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49695 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49695 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 213.152.162.181:9387 -> 192.168.2.4:49695
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49696 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 213.152.162.181:9387 -> 192.168.2.4:49696
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49697 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49697 -> 213.152.162.181:9387
    Source: Malware configuration extractorURLs: atelilian99.ddns.net
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: unknownDNS query: name: atelilian99.ddns.net
    Source: Joe Sandbox ViewASN Name: GLOBALLAYERNL GLOBALLAYERNL
    Source: Joe Sandbox ViewIP Address: 213.152.162.181 213.152.162.181
    Source: global trafficTCP traffic: 192.168.2.4:49695 -> 213.152.162.181:9387
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: CgpIx13Spu.exe, 00000000.00000002.561804154.0000000002731000.00000004.00000800.00020000.00000000.sdmp, unFmnPEZpvL.exe, 00000009.00000002.584415545.0000000002981000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.608708717.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
    Source: CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comD
    Source: CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comQ
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538631934.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTFQ
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/rep
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: CgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
    Source: CgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalics
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalicy
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsd
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomt
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdy
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comk
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlic
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commX
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comttF
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: CgpIx13Spu.exe, 00000000.00000003.537123993.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/h
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
    Source: CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/5
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Q
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/U
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/h
    Source: CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/5
    Source: CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/r
    Source: CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/y
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/y
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535187593.000000000502B000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535170566.000000000502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com$$
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com$$
    Source: CgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comen-u
    Source: CgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comx
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: CgpIx13Spu.exe, 00000000.00000003.537379906.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537307172.000000000501F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: atelilian99.ddns.net
    Source: CgpIx13Spu.exe, 00000000.00000002.561041582.0000000000A80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR

    System Summary

    barindex
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: CgpIx13Spu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_00D1C1A4
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_00D1E5F0
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_00D1E5E1
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BDF730
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BDF770
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BD508F
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_0A990040
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4C1A4
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4E5F0
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4E5E2
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0F730
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0F770
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0508F
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05250006
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05250040
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05254F08
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05254EF8
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05251DC8
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_0525BE50
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05251920
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 15_2_0291E480
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 15_2_0291E471
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 15_2_0291BBD4
    Source: CgpIx13Spu.exe, 00000000.00000002.561041582.0000000000A80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 00000000.00000000.533514866.00000000002E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameltlR.exe: vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 00000000.00000002.572120993.0000000006DE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 00000000.00000002.564028371.00000000039A7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C48000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814999201.0000000005640000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exeBinary or memory string: OriginalFilenameltlR.exe: vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: unFmnPEZpvL.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.10.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: CgpIx13Spu.exeReversingLabs: Detection: 64%
    Source: CgpIx13Spu.exeVirustotal: Detection: 54%
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Users\user\Desktop\CgpIx13Spu.exeJump to behavior
    Source: CgpIx13Spu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7EB8.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@26/17@43/2
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: CgpIx13Spu.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3984:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7924:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5200:120:WilError_01
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2b192589-e692-4024-abbd-8fa6959ae3b7}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7112:120:WilError_01
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\cmfUZmeJRtu
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7748:120:WilError_01
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: CgpIx13Spu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: CgpIx13Spu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: CgpIx13Spu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: ltlR.pdbSHA256 source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb} source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.pdbM source: CgpIx13Spu.exe, 0000000A.00000003.624498728.00000000066CC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ?\C:\Windows\dll\mscorlib.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ltlR.pdb source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr

    Data Obfuscation

    barindex
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BDAEC8 push esp; ret
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4F596 push es; iretd
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D00365 push es; iretd
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0E8F1 push eax; iretd
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D06BB8 push eax; iretd
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D070A0 push edi; iretd
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D07C20 pushfd ; iretd
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D07B93 pushfd ; iretd
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_052565EA push edx; retf
    Source: CgpIx13Spu.exeStatic PE information: 0xFB9F168F [Thu Oct 11 00:53:35 2103 UTC]
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76575096360064
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76575096360064
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76575096360064
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to dropped file
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile opened: C:\Users\user\Desktop\CgpIx13Spu.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exe TID: 7100Thread sleep time: -41202s >= -30000s
    Source: C:\Users\user\Desktop\CgpIx13Spu.exe TID: 7072Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7044Thread sleep count: 9423 > 30
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7324Thread sleep time: -5534023222112862s >= -30000s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7420Thread sleep time: -3689348814741908s >= -30000s
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe TID: 7340Thread sleep time: -41202s >= -30000s
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe TID: 7432Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\CgpIx13Spu.exe TID: 7592Thread sleep time: -19369081277395017s >= -30000s
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe TID: 7820Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7856Thread sleep time: -41202s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7872Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 8008Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9423
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9091
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeWindow / User API: threadDelayed 9608
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeWindow / User API: foregroundWindowGot 1061
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 41202
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 41202
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000E75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.815996906.0000000006C8D000.00000004.00000010.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002DA4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002C53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
    Source: CgpIx13Spu.exe, 0000000A.00000002.815154328.0000000005F1C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager8
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Users\user\Desktop\CgpIx13Spu.exe VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Users\user\Desktop\CgpIx13Spu.exe VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: CgpIx13Spu.exe, 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLog
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: CgpIx13Spu.exe, 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: unFmnPEZpvL.exe, 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: unFmnPEZpvL.exe, 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLog
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    12
    Process Injection
    2
    Masquerading
    21
    Input Capture
    11
    Security Software Discovery
    Remote Services21
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Scheduled Task/Job
    11
    Disable or Modify Tools
    LSASS Memory2
    Process Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    Remote System Discovery
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
    Obfuscated Files or Information
    DCSync12
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
    Timestomp
    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 877863 Sample: CgpIx13Spu.exe Startdate: 30/05/2023 Architecture: WINDOWS Score: 100 68 Snort IDS alert for network traffic 2->68 70 Multi AV Scanner detection for domain / URL 2->70 72 Found malware configuration 2->72 74 13 other signatures 2->74 7 CgpIx13Spu.exe 7 2->7         started        11 unFmnPEZpvL.exe 5 2->11         started        13 dhcpmon.exe 2->13         started        process3 file4 52 C:\Users\user\AppData\...\unFmnPEZpvL.exe, PE32 7->52 dropped 54 C:\Users\...\unFmnPEZpvL.exe:Zone.Identifier, ASCII 7->54 dropped 56 C:\Users\user\AppData\Local\...\tmp7EB8.tmp, XML 7->56 dropped 58 C:\Users\user\AppData\...\CgpIx13Spu.exe.log, ASCII 7->58 dropped 76 Uses schtasks.exe or at.exe to add and modify task schedules 7->76 78 Adds a directory exclusion to Windows Defender 7->78 15 CgpIx13Spu.exe 1 10 7->15         started        20 powershell.exe 20 7->20         started        22 powershell.exe 19 7->22         started        24 schtasks.exe 1 7->24         started        80 Multi AV Scanner detection for dropped file 11->80 82 Machine Learning detection for dropped file 11->82 26 schtasks.exe 11->26         started        28 unFmnPEZpvL.exe 11->28         started        30 unFmnPEZpvL.exe 11->30         started        32 schtasks.exe 13->32         started        34 dhcpmon.exe 13->34         started        signatures5 process6 dnsIp7 60 atelilian99.ddns.net 213.152.162.181, 49695, 49696, 49697 GLOBALLAYERNL Netherlands 15->60 62 192.168.2.1 unknown unknown 15->62 46 C:\Program Files (x86)\...\dhcpmon.exe, PE32 15->46 dropped 48 C:\Users\user\AppData\Roaming\...\run.dat, data 15->48 dropped 50 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 15->50 dropped 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->64 36 conhost.exe 20->36         started        38 conhost.exe 22->38         started        40 conhost.exe 24->40         started        42 conhost.exe 26->42         started        44 conhost.exe 32->44         started        file8 66 Uses dynamic DNS services 60->66 signatures9 process10

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    CgpIx13Spu.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    CgpIx13Spu.exe54%VirustotalBrowse
    CgpIx13Spu.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    No Antivirus matches
    SourceDetectionScannerLabelLink
    atelilian99.ddns.net8%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/50%URL Reputationsafe
    http://www.carterandcone.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/50%URL Reputationsafe
    http://www.carterandcone.comD0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
    http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.carterandcone.comQ0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.founder.com.cn/cn/h0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.fontbureau.comalsd0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/U0%URL Reputationsafe
    http://www.tiro.comx0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Q0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/r0%URL Reputationsafe
    http://www.fontbureau.comlic0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.com=0%Avira URL Cloudsafe
    http://www.fontbureau.comalics0%Avira URL Cloudsafe
    http://www.fontbureau.comttF0%Avira URL Cloudsafe
    http://www.fontbureau.comalicy0%Avira URL Cloudsafe
    http://www.fontbureau.comd0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/y0%URL Reputationsafe
    127.0.0.10%Avira URL Cloudsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/y0%URL Reputationsafe
    http://www.fontbureau.comk0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/h0%URL Reputationsafe
    http://www.fontbureau.commX0%Avira URL Cloudsafe
    http://www.fontbureau.com.TTFQ0%Avira URL Cloudsafe
    atelilian99.ddns.net100%Avira URL Cloudmalware
    http://www.sakkal.com$$0%Avira URL Cloudsafe
    http://www.fontbureau.comcomt0%Avira URL Cloudsafe
    http://www.fontbureau.comdy0%Avira URL Cloudsafe
    http://www.tiro.com$$0%Avira URL Cloudsafe
    http://www.tiro.comen-u0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    atelilian99.ddns.net
    213.152.162.181
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    127.0.0.1true
    • Avira URL Cloud: safe
    unknown
    atelilian99.ddns.nettrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.com/designersGCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.comalicyCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.comalicsCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.com/designers/?CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.founder.com.cn/cn/bTheCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers?CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.tiro.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designersCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.goodfont.co.krCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/jp/5CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comCgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comttFCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.sajatypeworks.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535187593.000000000502B000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535170566.000000000502B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.typography.netDCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cTheCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://fontfabrik.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/5CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comDCgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/4CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp//CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/repCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.galapagosdesign.com/DPleaseCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.comQCgpIx13Spu.exe, 00000000.00000003.538318448.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fonts.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.sandoll.co.krCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/hCgpIx13Spu.exe, 00000000.00000003.537123993.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleaseCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cnCgpIx13Spu.exe, 00000000.00000003.537379906.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537307172.000000000501F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCgpIx13Spu.exe, 00000000.00000002.561804154.0000000002731000.00000004.00000800.00020000.00000000.sdmp, unFmnPEZpvL.exe, 00000009.00000002.584415545.0000000002981000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.608708717.0000000002B31000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.sakkal.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com=CgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.fontbureau.comalsdCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538631934.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/UCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.commXCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com.TTFQCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comxCgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/QCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comdyCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sakkal.com$$CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.jiyu-kobo.co.jp/jp/rCgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comlicCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comcomtCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comaCgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comdCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/yCgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.com$$CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.jiyu-kobo.co.jp/yCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comkCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/Y0/CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/rCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/hCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comen-uCgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            213.152.162.181
                            atelilian99.ddns.netNetherlands
                            49453GLOBALLAYERNLtrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:37.1.0 Beryl
                            Analysis ID:877863
                            Start date and time:2023-05-30 06:21:08 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 9m 53s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:20
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:CgpIx13Spu.exe
                            Original Sample Name:dc586fef0d44e3b50964f916ab75a44f.exe
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@26/17@43/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe, WmiPrvSE.exe
                            • TCP Packets have been reduced to 100
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            06:22:03API Interceptor939x Sleep call for process: CgpIx13Spu.exe modified
                            06:22:07Task SchedulerRun new task: unFmnPEZpvL path: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            06:22:07API Interceptor65x Sleep call for process: powershell.exe modified
                            06:22:13API Interceptor1x Sleep call for process: unFmnPEZpvL.exe modified
                            06:22:17AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            06:22:28API Interceptor1x Sleep call for process: dhcpmon.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):696320
                            Entropy (8bit):7.758655688397579
                            Encrypted:false
                            SSDEEP:12288:e2N8jiZ4zypIPsKtPplTY6RhKuYqwxCWeWNsx0+Mzhe4rJQzSINgh2cywOuZq7Ie:e2N8jiZ4zypIPsKJTDEqACUlhe4rJTX6
                            MD5:DC586FEF0D44E3B50964F916AB75A44F
                            SHA1:D08B8281EEBD2221521C333BDBB5D74AA8A92D0A
                            SHA-256:6BAC4B7F411A6895A9992B4DDCE92D251DFE63C4AAFAB668D0C525DE4EDDD5F2
                            SHA-512:2991BE29DCB33C7E50C40D36CBD116D22BC3846ED8283956B7096BD5F76998D250F2A5DF40D99CFEFD18BE6D0A5BAB1CE4D1C56E286C263E87DFABCBF6AEC87F
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 65%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............r.... ........@.. ....................................@................................. ...O...................................H...p............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......@....[......a.......X...........................................^..}.....(.......(.....*...{.....o......{.....o......{.....o......(.....*....0...........r...p...(n...}.....{.....{....o......{....o.....o....r-..po......{....o.....o....r=..po......{....o.....o....rO..po......{....o.....o....ra..po......{....o.....o....rq..po......{....o.....o....ry..po......{....o.....o.....Po......{....o.....o.... ....o......{....o.....o.....Po......{....o.....o.....do......{....o.....
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):1302
                            Entropy (8bit):5.3499841584777394
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84bE4Ks:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:4664C2114894A4BFC1E657FC08C72FF4
                            SHA1:95A1E14E2AD65BCA561261DA3899074BF5276AED
                            SHA-256:6E36229D13672B4304C696812B365F2E5657875DD0E11F13AE010566CC87607A
                            SHA-512:4E7862716D5C0BC2174E819BAB329A2974FE83A36D5417EE732AB2F3D77D95620B3D462A1C9608F5FE90A48030140DE53DB642F8C370CD8E191BDBE83C638CA1
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            Process:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):21896
                            Entropy (8bit):5.595076717117252
                            Encrypted:false
                            SSDEEP:384:bQtCR7q09Q5cPxBn3wOYSBxnujulrItGiJ9g5SJ3uyV1Jm021AVrdAkY0A+iSYb:bw+PdY4xuClrSm5cuCX+b
                            MD5:02D4F39296832B3BA6DAFCD848D4C7C8
                            SHA1:3B380E1A9EE6548379DADFF26046C62440855F8E
                            SHA-256:13C2C9F9A79D5ADFCEEF862EB65DD62B1811ACC9D03151CEE2045992D8B1F1AE
                            SHA-512:F704279DD2875DB9120CF9135D93659F7C94E2798F897A7B892D713BE995D24B9119B319994F56BD27C95F952A82831B2E08EB946F39484C0E6865C509BF2A83
                            Malicious:false
                            Preview:@...e...............................(................@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1598
                            Entropy (8bit):5.140726940577047
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaExvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTbv
                            MD5:70E4C0E48F210D390D9BC0D2AD175770
                            SHA1:8B77A9E3693E06E70165AB847C5D1DF821E1D015
                            SHA-256:19FEEE7B05F20D2D2BB60E224CCDC0D2EB3343811233C996C00893AF5D1C2812
                            SHA-512:C4CF2E759CE1DFA5C9765D2F9952BD64B726674F5FC4571F91A6D9EC74C87E459863BFE95A74354784119F16ED6C00180F7D06D44A1C4B012DF6AAF234B2BE29
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1598
                            Entropy (8bit):5.140726940577047
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaExvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTbv
                            MD5:70E4C0E48F210D390D9BC0D2AD175770
                            SHA1:8B77A9E3693E06E70165AB847C5D1DF821E1D015
                            SHA-256:19FEEE7B05F20D2D2BB60E224CCDC0D2EB3343811233C996C00893AF5D1C2812
                            SHA-512:C4CF2E759CE1DFA5C9765D2F9952BD64B726674F5FC4571F91A6D9EC74C87E459863BFE95A74354784119F16ED6C00180F7D06D44A1C4B012DF6AAF234B2BE29
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1598
                            Entropy (8bit):5.140726940577047
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaExvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTbv
                            MD5:70E4C0E48F210D390D9BC0D2AD175770
                            SHA1:8B77A9E3693E06E70165AB847C5D1DF821E1D015
                            SHA-256:19FEEE7B05F20D2D2BB60E224CCDC0D2EB3343811233C996C00893AF5D1C2812
                            SHA-512:C4CF2E759CE1DFA5C9765D2F9952BD64B726674F5FC4571F91A6D9EC74C87E459863BFE95A74354784119F16ED6C00180F7D06D44A1C4B012DF6AAF234B2BE29
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:data
                            Category:modified
                            Size (bytes):232
                            Entropy (8bit):7.024371743172393
                            Encrypted:false
                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                            MD5:32D0AAE13696FF7F8AF33B2D22451028
                            SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                            SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                            SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                            Malicious:false
                            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:YwEt:g
                            MD5:C59B0B18C8475E4D66705A4A34FD91CC
                            SHA1:E8398A8A8A6E4571DA88382D478E7021F567CDC4
                            SHA-256:ECDDA12382ECCDB28601D1673E99A2E640563D92F2F40DB4A76B7A00EBA77B93
                            SHA-512:A2BA3660F18E0D9BC1E96E11A9A35CDAF8E172C0811EBD4E227E9EBEF48E3FF92BF8B37B4C52768192351CD721FF144103ED8111F0859D722F2EE37BB93D3E2C
                            Malicious:true
                            Preview:5..r.`.H
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):696320
                            Entropy (8bit):7.758655688397579
                            Encrypted:false
                            SSDEEP:12288:e2N8jiZ4zypIPsKtPplTY6RhKuYqwxCWeWNsx0+Mzhe4rJQzSINgh2cywOuZq7Ie:e2N8jiZ4zypIPsKJTDEqACUlhe4rJTX6
                            MD5:DC586FEF0D44E3B50964F916AB75A44F
                            SHA1:D08B8281EEBD2221521C333BDBB5D74AA8A92D0A
                            SHA-256:6BAC4B7F411A6895A9992B4DDCE92D251DFE63C4AAFAB668D0C525DE4EDDD5F2
                            SHA-512:2991BE29DCB33C7E50C40D36CBD116D22BC3846ED8283956B7096BD5F76998D250F2A5DF40D99CFEFD18BE6D0A5BAB1CE4D1C56E286C263E87DFABCBF6AEC87F
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 65%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............r.... ........@.. ....................................@................................. ...O...................................H...p............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......@....[......a.......X...........................................^..}.....(.......(.....*...{.....o......{.....o......{.....o......(.....*....0...........r...p...(n...}.....{.....{....o......{....o.....o....r-..po......{....o.....o....r=..po......{....o.....o....rO..po......{....o.....o....ra..po......{....o.....o....rq..po......{....o.....o....ry..po......{....o.....o.....Po......{....o.....o.... ....o......{....o.....o.....Po......{....o.....o.....do......{....o.....
                            Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.758655688397579
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:CgpIx13Spu.exe
                            File size:696320
                            MD5:dc586fef0d44e3b50964f916ab75a44f
                            SHA1:d08b8281eebd2221521c333bdbb5d74aa8a92d0a
                            SHA256:6bac4b7f411a6895a9992b4ddce92d251dfe63c4aafab668d0c525de4eddd5f2
                            SHA512:2991be29dcb33c7e50c40d36cbd116d22bc3846ed8283956b7096bd5f76998d250f2a5df40d99cfefd18be6d0a5bab1ce4d1c56e286c263e87dfabcbf6aec87f
                            SSDEEP:12288:e2N8jiZ4zypIPsKtPplTY6RhKuYqwxCWeWNsx0+Mzhe4rJQzSINgh2cywOuZq7Ie:e2N8jiZ4zypIPsKJTDEqACUlhe4rJTX6
                            TLSH:D8E402C43379AF46D873A7F4445452B8437EA86AB932E3430D83F0DA9AA5F444E91F1B
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............r.... ........@.. ....................................@................................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x4ab472
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0xFB9F168F [Thu Oct 11 00:53:35 2103 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xab4200x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x5ac.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xa94480x70.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xa94780xa9600False0.9084986162361623data7.76575096360064IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xac0000x5ac0x600False0.421875data4.087184081731354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xae0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0xac0900x31cdata
                            RT_MANIFEST0xac3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            213.152.162.181192.168.2.49387496962841753 05/30/23-06:23:12.736325TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)938749696213.152.162.181192.168.2.4
                            192.168.2.4213.152.162.1814969793872025019 05/30/23-06:23:42.157295TCP2025019ET TROJAN Possible NanoCore C2 60B496979387192.168.2.4213.152.162.181
                            192.168.2.4213.152.162.1814969693872025019 05/30/23-06:23:12.265301TCP2025019ET TROJAN Possible NanoCore C2 60B496969387192.168.2.4213.152.162.181
                            192.168.2.4213.152.162.1814969593872025019 05/30/23-06:22:41.923978TCP2025019ET TROJAN Possible NanoCore C2 60B496959387192.168.2.4213.152.162.181
                            192.168.2.4213.152.162.1814969593872816766 05/30/23-06:22:42.804651TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496959387192.168.2.4213.152.162.181
                            192.168.2.4213.152.162.1814969793872816766 05/30/23-06:23:43.464776TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496979387192.168.2.4213.152.162.181
                            213.152.162.181192.168.2.49387496952841753 05/30/23-06:22:43.336347TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)938749695213.152.162.181192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            May 30, 2023 06:22:41.508732080 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:41.744621992 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:41.744760990 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:41.923978090 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:42.487500906 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:42.541939974 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:42.613882065 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:42.804510117 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:42.804651022 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.246304989 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.246417999 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.336347103 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.385773897 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.554548979 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.562437057 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.562505960 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.574924946 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.753716946 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.753774881 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.753797054 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.753832102 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.753838062 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.753882885 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:22:43.753887892 CEST938749695213.152.162.181192.168.2.4
                            May 30, 2023 06:22:43.753936052 CEST496959387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:12.071541071 CEST496969387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:12.264368057 CEST938749696213.152.162.181192.168.2.4
                            May 30, 2023 06:23:12.264554024 CEST496969387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:12.265300989 CEST496969387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:12.566230059 CEST938749696213.152.162.181192.168.2.4
                            May 30, 2023 06:23:12.568962097 CEST496969387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:12.736325026 CEST938749696213.152.162.181192.168.2.4
                            May 30, 2023 06:23:12.841810942 CEST496969387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:13.042467117 CEST938749696213.152.162.181192.168.2.4
                            May 30, 2023 06:23:13.051351070 CEST496969387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:13.077162981 CEST496969387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:41.984854937 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:42.156399965 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:42.156558037 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:42.157294989 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:42.584623098 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:42.584820032 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:42.594243050 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:42.640885115 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:42.996824980 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:42.997116089 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.184432983 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.197169065 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.464411020 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.464776039 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.472467899 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.472791910 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.655715942 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.655760050 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.655951977 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.662724018 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.662763119 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.662925005 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.895749092 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.896639109 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.896739006 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.896821976 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.896871090 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.896961927 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.903920889 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.904055119 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.904135942 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.904166937 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:43.904218912 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:43.904304028 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.075617075 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.075689077 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.075803995 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.076646090 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.076699018 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.076745987 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.076766968 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.076797962 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.076843977 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.076858997 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.083528042 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.083578110 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.083625078 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.083671093 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.083718061 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.083715916 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.083802938 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.084388971 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.084436893 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.084511042 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.084558964 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.084599018 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.084656954 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.315434933 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.315506935 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.315670013 CEST496979387192.168.2.4213.152.162.181
                            May 30, 2023 06:23:44.316407919 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.316462040 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.316548109 CEST938749697213.152.162.181192.168.2.4
                            May 30, 2023 06:23:44.316593885 CEST938749697213.152.162.181192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            May 30, 2023 06:22:16.854002953 CEST5968353192.168.2.437.235.1.174
                            May 30, 2023 06:22:18.062854052 CEST5968353192.168.2.437.235.1.174
                            May 30, 2023 06:22:19.104496002 CEST5968353192.168.2.437.235.1.174
                            May 30, 2023 06:22:21.104768991 CEST5968353192.168.2.437.235.1.174
                            May 30, 2023 06:22:25.133699894 CEST5968353192.168.2.437.235.1.174
                            May 30, 2023 06:22:29.209393024 CEST6416753192.168.2.437.235.1.177
                            May 30, 2023 06:22:30.228588104 CEST6416753192.168.2.437.235.1.177
                            May 30, 2023 06:22:31.275765896 CEST6416753192.168.2.437.235.1.177
                            May 30, 2023 06:22:33.297673941 CEST6416753192.168.2.437.235.1.177
                            May 30, 2023 06:22:37.396856070 CEST6416753192.168.2.437.235.1.177
                            May 30, 2023 06:22:41.471667051 CEST6100753192.168.2.48.8.8.8
                            May 30, 2023 06:22:41.498262882 CEST53610078.8.8.8192.168.2.4
                            May 30, 2023 06:22:47.655108929 CEST6068653192.168.2.437.235.1.174
                            May 30, 2023 06:22:48.653067112 CEST6068653192.168.2.437.235.1.174
                            May 30, 2023 06:22:49.652857065 CEST6068653192.168.2.437.235.1.174
                            May 30, 2023 06:22:51.699614048 CEST6068653192.168.2.437.235.1.174
                            May 30, 2023 06:22:55.731234074 CEST6068653192.168.2.437.235.1.174
                            May 30, 2023 06:22:59.801834106 CEST6112453192.168.2.437.235.1.177
                            May 30, 2023 06:23:00.830032110 CEST6112453192.168.2.437.235.1.177
                            May 30, 2023 06:23:01.873676062 CEST6112453192.168.2.437.235.1.177
                            May 30, 2023 06:23:03.963443995 CEST6112453192.168.2.437.235.1.177
                            May 30, 2023 06:23:07.951122046 CEST6112453192.168.2.437.235.1.177
                            May 30, 2023 06:23:12.028436899 CEST5944453192.168.2.48.8.8.8
                            May 30, 2023 06:23:12.056085110 CEST53594448.8.8.8192.168.2.4
                            May 30, 2023 06:23:17.136106014 CEST5557053192.168.2.437.235.1.174
                            May 30, 2023 06:23:18.196037054 CEST5557053192.168.2.437.235.1.174
                            May 30, 2023 06:23:19.233864069 CEST5557053192.168.2.437.235.1.174
                            May 30, 2023 06:23:21.248723030 CEST5557053192.168.2.437.235.1.174
                            May 30, 2023 06:23:25.280725956 CEST5557053192.168.2.437.235.1.174
                            May 30, 2023 06:23:29.805553913 CEST6490653192.168.2.437.235.1.177
                            May 30, 2023 06:23:30.812082052 CEST6490653192.168.2.437.235.1.177
                            May 30, 2023 06:23:31.828206062 CEST6490653192.168.2.437.235.1.177
                            May 30, 2023 06:23:33.875144958 CEST6490653192.168.2.437.235.1.177
                            May 30, 2023 06:23:37.921946049 CEST6490653192.168.2.437.235.1.177
                            May 30, 2023 06:23:41.955786943 CEST5944653192.168.2.48.8.8.8
                            May 30, 2023 06:23:41.981828928 CEST53594468.8.8.8192.168.2.4
                            May 30, 2023 06:23:48.423970938 CEST5086153192.168.2.437.235.1.174
                            May 30, 2023 06:23:49.425367117 CEST5086153192.168.2.437.235.1.174
                            May 30, 2023 06:23:50.439079046 CEST5086153192.168.2.437.235.1.174
                            May 30, 2023 06:23:52.485939980 CEST5086153192.168.2.437.235.1.174
                            May 30, 2023 06:23:56.486330986 CEST5086153192.168.2.437.235.1.174
                            May 30, 2023 06:24:00.524131060 CEST6108853192.168.2.437.235.1.177
                            May 30, 2023 06:24:01.533629894 CEST6108853192.168.2.437.235.1.177
                            May 30, 2023 06:24:02.533974886 CEST6108853192.168.2.437.235.1.177
                            May 30, 2023 06:24:04.790138960 CEST6108853192.168.2.437.235.1.177
                            May 30, 2023 06:24:13.178560972 CEST6108853192.168.2.437.235.1.177
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            May 30, 2023 06:22:16.854002953 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:18.062854052 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:19.104496002 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:21.104768991 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:25.133699894 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:29.209393024 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:30.228588104 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:31.275765896 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:33.297673941 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:37.396856070 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:41.471667051 CEST192.168.2.48.8.8.80x76ecStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:47.655108929 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:48.653067112 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:49.652857065 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:51.699614048 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:55.731234074 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:22:59.801834106 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:00.830032110 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:01.873676062 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:03.963443995 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:07.951122046 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:12.028436899 CEST192.168.2.48.8.8.80xee70Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:17.136106014 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:18.196037054 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:19.233864069 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:21.248723030 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:25.280725956 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:29.805553913 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:30.812082052 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:31.828206062 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:33.875144958 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:37.921946049 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:41.955786943 CEST192.168.2.48.8.8.80x5c7dStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:48.423970938 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:49.425367117 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:50.439079046 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:52.485939980 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:23:56.486330986 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:24:00.524131060 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:24:01.533629894 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:24:02.533974886 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:24:04.790138960 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            May 30, 2023 06:24:13.178560972 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            May 30, 2023 06:22:41.498262882 CEST8.8.8.8192.168.2.40x76ecNo error (0)atelilian99.ddns.net213.152.162.181A (IP address)IN (0x0001)false
                            May 30, 2023 06:23:12.056085110 CEST8.8.8.8192.168.2.40xee70No error (0)atelilian99.ddns.net213.152.162.181A (IP address)IN (0x0001)false
                            May 30, 2023 06:23:41.981828928 CEST8.8.8.8192.168.2.40x5c7dNo error (0)atelilian99.ddns.net213.152.162.181A (IP address)IN (0x0001)false

                            Click to jump to process

                            Target ID:0
                            Start time:06:22:00
                            Start date:30/05/2023
                            Path:C:\Users\user\Desktop\CgpIx13Spu.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\CgpIx13Spu.exe
                            Imagebase:0x2e0000
                            File size:696320 bytes
                            MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low

                            Target ID:2
                            Start time:06:22:05
                            Start date:30/05/2023
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
                            Imagebase:0x10c0000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:3
                            Start time:06:22:05
                            Start date:30/05/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:4
                            Start time:06:22:05
                            Start date:30/05/2023
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            Imagebase:0x10c0000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:5
                            Start time:06:22:05
                            Start date:30/05/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:6
                            Start time:06:22:05
                            Start date:30/05/2023
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp
                            Imagebase:0x200000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:7
                            Start time:06:22:05
                            Start date:30/05/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:9
                            Start time:06:22:07
                            Start date:30/05/2023
                            Path:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            Imagebase:0x410000
                            File size:696320 bytes
                            MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 65%, ReversingLabs
                            Reputation:low

                            Target ID:10
                            Start time:06:22:11
                            Start date:30/05/2023
                            Path:C:\Users\user\Desktop\CgpIx13Spu.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\CgpIx13Spu.exe
                            Imagebase:0x7a0000
                            File size:696320 bytes
                            MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low

                            Target ID:12
                            Start time:06:22:20
                            Start date:30/05/2023
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp
                            Imagebase:0x200000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:13
                            Start time:06:22:20
                            Start date:30/05/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:14
                            Start time:06:22:21
                            Start date:30/05/2023
                            Path:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            Imagebase:0x2d0000
                            File size:696320 bytes
                            MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:15
                            Start time:06:22:21
                            Start date:30/05/2023
                            Path:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            Imagebase:0x5b0000
                            File size:696320 bytes
                            MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            Target ID:16
                            Start time:06:22:26
                            Start date:30/05/2023
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                            Imagebase:0x7d0000
                            File size:696320 bytes
                            MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 65%, ReversingLabs

                            Target ID:17
                            Start time:06:22:29
                            Start date:30/05/2023
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
                            Imagebase:0x200000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:18
                            Start time:06:22:29
                            Start date:30/05/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:19
                            Start time:06:22:30
                            Start date:30/05/2023
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Imagebase:0x970000
                            File size:696320 bytes
                            MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            No disassembly