Loading ...

Play interactive tourEdit tour

Windows Analysis Report RFQ 10 UNIT.exe

Overview

General Information

Sample Name:RFQ 10 UNIT.exe
Analysis ID:451100
MD5:97904d814bcda66efe2d278ef92da65f
SHA1:6ce40705c8de4e3c8efb1857deb76357ac500df7
SHA256:d4a810dc5c1bf6cfcedaf05d46a9230250ce314cc19082ca044763dcd9ff7135
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • RFQ 10 UNIT.exe (PID: 3096 cmdline: 'C:\Users\user\Desktop\RFQ 10 UNIT.exe' MD5: 97904D814BCDA66EFE2D278EF92DA65F)
    • RFQ 10 UNIT.exe (PID: 4572 cmdline: C:\Users\user\Desktop\RFQ 10 UNIT.exe MD5: 97904D814BCDA66EFE2D278EF92DA65F)
    • RFQ 10 UNIT.exe (PID: 1540 cmdline: C:\Users\user\Desktop\RFQ 10 UNIT.exe MD5: 97904D814BCDA66EFE2D278EF92DA65F)
  • dhcpmon.exe (PID: 4076 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 97904D814BCDA66EFE2D278EF92DA65F)
    • dhcpmon.exe (PID: 1396 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 97904D814BCDA66EFE2D278EF92DA65F)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xb4357:$a: NanoCore
      • 0xb437c:$a: NanoCore
      • 0xb43d5:$a: NanoCore
      • 0xc4574:$a: NanoCore
      • 0xc459a:$a: NanoCore
      • 0xc45f6:$a: NanoCore
      • 0xd144d:$a: NanoCore
      • 0xd14a6:$a: NanoCore
      • 0xd14d9:$a: NanoCore
      • 0xd1705:$a: NanoCore
      • 0xd1781:$a: NanoCore
      • 0xd1d9a:$a: NanoCore
      • 0xd1ee3:$a: NanoCore
      • 0xd23b7:$a: NanoCore
      • 0xd269e:$a: NanoCore
      • 0xd26b5:$a: NanoCore
      • 0xdb559:$a: NanoCore
      • 0xdb5d5:$a: NanoCore
      • 0xddeb8:$a: NanoCore
      • 0xe3481:$a: NanoCore
      • 0xe34fb:$a: NanoCore
      Click to see the 3 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      8.2.RFQ 10 UNIT.exe.476b80e.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x3d99:$x1: NanoCore.ClientPluginHost
      • 0xcd3b:$x1: NanoCore.ClientPluginHost
      • 0x3db3:$x2: IClientNetworkHost
      • 0xcd55:$x2: IClientNetworkHost
      8.2.RFQ 10 UNIT.exe.476b80e.12.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x3d99:$x2: NanoCore.ClientPluginHost
      • 0xcd3b:$x2: NanoCore.ClientPluginHost
      • 0x4dce:$s4: PipeCreated
      • 0x3d86:$s5: IClientLoggingHost
      • 0xcd28:$s5: IClientLoggingHost
      8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x8ba5:$x1: NanoCore.ClientPluginHost
      • 0x15d1f:$x1: NanoCore.ClientPluginHost
      • 0x1fb7f:$x1: NanoCore.ClientPluginHost
      • 0x27ab5:$x1: NanoCore.ClientPluginHost
      • 0x2da98:$x1: NanoCore.ClientPluginHost
      • 0x37513:$x1: NanoCore.ClientPluginHost
      • 0x4194f:$x1: NanoCore.ClientPluginHost
      • 0x4c941:$x1: NanoCore.ClientPluginHost
      • 0x586f7:$x1: NanoCore.ClientPluginHost
      • 0x6444e:$x1: NanoCore.ClientPluginHost
      • 0x8bd2:$x2: IClientNetworkHost
      • 0x15d58:$x2: IClientNetworkHost
      • 0x1fbb8:$x2: IClientNetworkHost
      • 0x27aee:$x2: IClientNetworkHost
      • 0x37670:$x2: IClientNetworkHost
      • 0x41988:$x2: IClientNetworkHost
      • 0x4c95b:$x2: IClientNetworkHost
      • 0x58711:$x2: IClientNetworkHost
      • 0x6448b:$x2: IClientNetworkHost
      8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x8b7f:$a: NanoCore
      • 0x8ba5:$a: NanoCore
      • 0x8c01:$a: NanoCore
      • 0x15a67:$a: NanoCore
      • 0x15ac0:$a: NanoCore
      • 0x15af3:$a: NanoCore
      • 0x15d1f:$a: NanoCore
      • 0x15d9b:$a: NanoCore
      • 0x163b4:$a: NanoCore
      • 0x164fd:$a: NanoCore
      • 0x169d1:$a: NanoCore
      • 0x16cb8:$a: NanoCore
      • 0x16ccf:$a: NanoCore
      • 0x1fb7f:$a: NanoCore
      • 0x1fbfb:$a: NanoCore
      • 0x224de:$a: NanoCore
      • 0x27ab5:$a: NanoCore
      • 0x27b2f:$a: NanoCore
      • 0x2da98:$a: NanoCore
      • 0x2dae2:$a: NanoCore
      • 0x2e73c:$a: NanoCore
      8.2.RFQ 10 UNIT.exe.456f7c1.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x2dbb:$x1: NanoCore.ClientPluginHost
      • 0x2de5:$x2: IClientNetworkHost
      Click to see the 69 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 19%
      Multi AV Scanner detection for submitted fileShow sources
      Source: RFQ 10 UNIT.exeReversingLabs: Detection: 19%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY
      Machine Learning detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: RFQ 10 UNIT.exeJoe Sandbox ML: detected
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpackAvira: Label: TR/NanoCore.fadte
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 24.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: RFQ 10 UNIT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: RFQ 10 UNIT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: dedicatedlambo9.ddns.net
      Source: Malware configuration extractorURLs: 185.140.53.253
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: dedicatedlambo9.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49725 -> 185.140.53.253:1604
      Source: global trafficTCP traffic: 192.168.2.3:49729 -> 84.38.133.182:1604
      Source: Joe Sandbox ViewIP Address: 185.140.53.253 185.140.53.253
      Source: Joe Sandbox ViewASN Name: DATACLUB-NL DATACLUB-NL
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownDNS traffic detected: queries for: dedicatedlambo9.ddns.net
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: http://google.com
      Source: RFQ 10 UNIT.exe, 00000000.00000003.215074208.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc(
      Source: RFQ 10 UNIT.exe, 00000000.00000003.214967601.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comcJ
      Source: RFQ 10 UNIT.exe, 00000000.00000003.214937293.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comic
      Source: RFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmp, RFQ 10 UNIT.exe, 00000000.00000003.217178822.00000000058EC000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: RFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnayov
      Source: RFQ 10 UNIT.exe, 00000000.00000003.215153399.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comA
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.3189684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.4590022.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.485635523.0000000004706000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeCode function: 8_2_031EE4718_2_031EE471
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeCode function: 8_2_031EE4808_2_031EE480
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeCode function: 8_2_031EBBD48_2_031EBBD4
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0309E47124_2_0309E471
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0309E48024_2_0309E480
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0309BBD424_2_0309BBD4
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0565F5F824_2_0565F5F8
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0565978824_2_05659788
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0565A61024_2_0565A610
      Source: RFQ 10 UNIT.exe, 00000000.00000000.209499426.00000000004A2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeBinary or memory string: OriginalFilename vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000007.00000000.269384397.0000000000372000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeBinary or memory string: OriginalFilename vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.476275048.0000000000E72000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.479103223.000000000162A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.3189684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.3189684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.4590022.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.485635523.0000000004706000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: RFQ 10 UNIT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: dhcpmon.exe.8.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@12/2
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ 10 UNIT.exe.logJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c9622013-90b3-4810-9b2a-2fbba1723547}
      Source: RFQ 10 UNIT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: RFQ 10 UNIT.exeReversingLabs: Detection: 19%
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile read: C:\Users\user\Desktop\RFQ 10 UNIT.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe 'C:\Users\user\Desktop\RFQ 10 UNIT.exe'
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exeJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exeJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: RFQ 10 UNIT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: RFQ 10 UNIT.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: RFQ 10 UNIT.exeStatic file information: File size 1098240 > 1048576
      Source: RFQ 10 UNIT.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10ba00
      Source: RFQ 10 UNIT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: RFQ 10 UNIT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: RFQ 10 UNIT.exeStatic PE information: 0xBA9DB0CD [Tue Mar 19 05:29:49 2069 UTC]
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0565B5E0 push eax; retf 24_2_0565B5ED
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_056569F8 pushad ; retf 24_2_056569F9
      Source: initial sampleStatic PE information: section name: .text entropy: 7.62768729612
      Source: initial sampleStatic PE information: section name: .text entropy: 7.62768729612
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile opened: C:\Users\user\Desktop\RFQ 10 UNIT.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: threadDelayed 2059Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: threadDelayed 7456Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: foregroundWindowGot 532Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: foregroundWindowGot 605Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exe TID: 4472Thread sleep time: -48714s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exe TID: 1488Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exe TID: 3396Thread sleep time: -13835058055282155s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2648Thread sleep time: -53647s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1784Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2116Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 48714Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 53647Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: RFQ 10 UNIT.exe, dhcpmon.exeBinary or memory string: zE[TiU[]qET]m8Z\3QqeMU[]K<IgogJD|YJg4E[eyQ3[3Y5]DL6e3Q5\xDjfoUZd5<pfTU6\osp\SQ[]mopg|Y5XlY5Y843[wEjfoUZd5<pfTU6\osp\SQ[e|<pU843[wEjfoQ[YDL[]nopgyMKX3QZ]tM5W|Y5fY<YeDL[]nopgyMKX3QZ]tM5WzE[Ti4JD|YJ]s]6e|EIgmYpdl<nfoU[gz45eG<YeDPZeV]WerYHWsYZfGgmTWg4U3EzTqEqVWooe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.479715222.00000000016E0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll?6N
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeMemory written: C:\Users\user\Desktop\RFQ 10 UNIT.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exeJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exeJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: RFQ 10 UNIT.exe, 00000008.00000002.483664645.0000000003711000.00000004.00000001.sdmpBinary or memory string: Program Manager0+
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Users\user\Desktop\RFQ 10 UNIT.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Users\user\Desktop\RFQ 10 UNIT.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dhcpmon.exe, 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000018.00000002.402407981.0000000003121000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection112Masquerading2Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery111Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      RFQ 10 UNIT.exe20%ReversingLabsWin32.Trojan.AgentTesla
      RFQ 10 UNIT.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe20%ReversingLabsWin32.Trojan.AgentTesla

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      8.2.RFQ 10 UNIT.exe.4438a40.6.unpack100%AviraTR/NanoCore.fadteDownload File
      8.2.RFQ 10 UNIT.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      24.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      dedicatedlambo9.ddns.net0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.fonts.comic0%URL Reputationsafe
      http://www.fonts.comic0%URL Reputationsafe
      http://www.fonts.comic0%URL Reputationsafe
      http://www.founder.com.cn/cnayov0%Avira URL Cloudsafe
      http://www.fonts.comcJ0%Avira URL Cloudsafe
      185.140.53.2530%Avira URL Cloudsafe
      http://www.tiro.comA0%Avira URL Cloudsafe
      http://www.fonts.comc(0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      dedicatedlambo9.ddns.net
      84.38.133.182
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        dedicatedlambo9.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        185.140.53.253true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.founder.com.cn/cnRFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmp, RFQ 10 UNIT.exe, 00000000.00000003.217178822.00000000058EC000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.fonts.comicRFQ 10 UNIT.exe, 00000000.00000003.214937293.00000000058FB000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cnayovRFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://google.comRFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpfalse
          high
          http://www.fonts.comcJRFQ 10 UNIT.exe, 00000000.00000003.214967601.00000000058FB000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tiro.comARFQ 10 UNIT.exe, 00000000.00000003.215153399.00000000058FB000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fonts.comc(RFQ 10 UNIT.exe, 00000000.00000003.215074208.00000000058FB000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          low

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          84.38.133.182
          dedicatedlambo9.ddns.netLatvia
          203557DATACLUB-NLtrue
          185.140.53.253
          unknownSweden
          209623DAVID_CRAIGGGtrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:451100
          Start date:20.07.2021
          Start time:08:30:30
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 11m 35s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:RFQ 10 UNIT.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:28
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@8/8@12/2
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 49
          • Number of non-executed functions: 3
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 40.88.32.150, 52.147.198.201, 23.211.6.115, 168.61.161.212, 13.88.21.125, 52.255.188.83, 23.211.4.86, 20.82.210.154, 173.222.108.210, 173.222.108.226, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.49.157.6
          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolwus15.cloudapp.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/451100/sample/RFQ 10 UNIT.exe

          Simulations

          Behavior and APIs

          TimeTypeDescription
          08:31:49API Interceptor792x Sleep call for process: RFQ 10 UNIT.exe modified
          08:31:56AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          08:32:40API Interceptor1x Sleep call for process: dhcpmon.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          185.140.53.253NEWORDERrefno0992883jpg.exeGet hashmaliciousBrowse
            CompanyLicense.exeGet hashmaliciousBrowse
              16Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                15Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                  58Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                    57Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                      15Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                        14Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                          57Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                            56Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse

                              Domains

                              No context

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              DAVID_CRAIGGGA2CGhuioKe.exeGet hashmaliciousBrowse
                              • 185.244.30.28
                              0kEuVjiCbh.exeGet hashmaliciousBrowse
                              • 185.244.30.28
                              RFQ_Order WT013 - A11197322,pdf.exeGet hashmaliciousBrowse
                              • 185.244.30.18
                              ORDER.exeGet hashmaliciousBrowse
                              • 185.140.53.132
                              DHL_119040 receipt document,pdf.exeGet hashmaliciousBrowse
                              • 185.244.30.18
                              Img 673t5718737.exeGet hashmaliciousBrowse
                              • 91.193.75.202
                              Parts_Enquiry_450kr6CRT.vbsGet hashmaliciousBrowse
                              • 185.140.53.169
                              ltemsreceipt975432907.exeGet hashmaliciousBrowse
                              • 185.244.30.19
                              H194 #U5146#U57fa - Payment.exeGet hashmaliciousBrowse
                              • 185.140.53.135
                              Parts-Enquiry_OYU08W0VCWRDLPA.vbsGet hashmaliciousBrowse
                              • 185.140.53.169
                              OneDrive.exeGet hashmaliciousBrowse
                              • 185.140.53.194
                              CVhssiltQ9.exeGet hashmaliciousBrowse
                              • 185.140.53.9
                              rz89FRwKvB.exeGet hashmaliciousBrowse
                              • 185.244.30.92
                              doc030WA0004-55YH701-75IMG0012.exeGet hashmaliciousBrowse
                              • 185.140.53.230
                              Request For Quotation.xlsxGet hashmaliciousBrowse
                              • 185.140.53.154
                              CV CREDENTIALS.exeGet hashmaliciousBrowse
                              • 185.140.53.8
                              ARRIVAL NOTICEPDF.EXCL.exeGet hashmaliciousBrowse
                              • 185.140.53.142
                              WeASwOPOdNuVKbq.exeGet hashmaliciousBrowse
                              • 185.140.53.8
                              New Order# 11009947810.exeGet hashmaliciousBrowse
                              • 185.140.53.216
                              vEJ2Mfxn6p.exeGet hashmaliciousBrowse
                              • 185.140.53.134
                              DATACLUB-NLFacebookSecurityUpdate.exeGet hashmaliciousBrowse
                              • 84.38.133.101
                              v1hBv6A71M.exeGet hashmaliciousBrowse
                              • 84.38.133.24
                              Standardequips_Quote.pptGet hashmaliciousBrowse
                              • 185.29.11.15
                              XsNgUDFxLw.exeGet hashmaliciousBrowse
                              • 84.38.133.117
                              18Order.exeGet hashmaliciousBrowse
                              • 185.29.11.103
                              56New Order oct 2018230090.exeGet hashmaliciousBrowse
                              • 185.29.11.103

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):1098240
                              Entropy (8bit):7.622687617903329
                              Encrypted:false
                              SSDEEP:24576:+bnQK7ECKrvDBI1/jUHsvoCzA+7ZAkwVileDd2A0iM3/4UF+voC:DBW1/aunlikidX0iM3/pmd
                              MD5:97904D814BCDA66EFE2D278EF92DA65F
                              SHA1:6CE40705C8DE4E3C8EFB1857DEB76357AC500DF7
                              SHA-256:D4A810DC5C1BF6CFCEDAF05D46A9230250CE314CC19082CA044763DCD9FF7135
                              SHA-512:ADB1CCA1A4ED550CE3B0339CB60ECDC22EFB2A7EA3315137CFA31934C73DCAC9E61308D9E964C6F187E55496439E0D26582E26ADCC519D6ABDEEF7DA1A9F8F4C
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 20%
                              Reputation:low
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................P.................. ........@.. ....................... ............@.................................P...O...................................4................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...........||..........l....<...........................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....o....('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*&..(3....*...0..<........~.....(4.....,!r...p.....(5...o6...s7............~.....
                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: [ZoneTransfer]....ZoneId=0
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ 10 UNIT.exe.log
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1314
                              Entropy (8bit):5.350128552078965
                              Encrypted:false
                              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1314
                              Entropy (8bit):5.350128552078965
                              Encrypted:false
                              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1624
                              Entropy (8bit):7.024371743172393
                              Encrypted:false
                              SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC08
                              MD5:0D79388CEC6619D612C2088173BB6741
                              SHA1:8A312E3198009C545D0CF3254572189D29A03EA7
                              SHA-256:D7D423B23D932E306F3CCB2F7A984B7036A042C007A43FD655C6B57B960BB8DF
                              SHA-512:53BB3E9263DFD746E7E8159466E220E6EC9D81E9D3F0E1D191E09CD511B7EB93B0BA65D13CE0C97C652ECD0F69BB991E6B1840F961BC65003C4DD7AA93EEDA13
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):3.0
                              Encrypted:false
                              SSDEEP:3:b+:S
                              MD5:2E61B957E818BFB06D029DFFAD9186CA
                              SHA1:D4950C122F3C8F85DECC2A8EAF4A7307F6E0EBB9
                              SHA-256:5686B94B5CE4C8B0D3A479A2856CE1AAFFAEF5B3A75901F45F530470031F1090
                              SHA-512:EE64E72026088B64B7BC7BFAF152D261E23A1F76EC9517B4C4103332AA3FBE836BFC110183F70F6412E6A5B8221EF56D4D0793FADCA4DC0DC00B4829EC36616D
                              Malicious:true
                              Preview: .....K.H
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:modified
                              Size (bytes):40
                              Entropy (8bit):5.153055907333276
                              Encrypted:false
                              SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                              MD5:4E5E92E2369688041CC82EF9650EDED2
                              SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                              SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                              SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                              Malicious:false
                              Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):327432
                              Entropy (8bit):7.99938831605763
                              Encrypted:true
                              SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                              MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                              SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                              SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                              SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                              Malicious:false
                              Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.622687617903329
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:RFQ 10 UNIT.exe
                              File size:1098240
                              MD5:97904d814bcda66efe2d278ef92da65f
                              SHA1:6ce40705c8de4e3c8efb1857deb76357ac500df7
                              SHA256:d4a810dc5c1bf6cfcedaf05d46a9230250ce314cc19082ca044763dcd9ff7135
                              SHA512:adb1cca1a4ed550ce3b0339cb60ecdc22efb2a7ea3315137cfa31934c73dcac9e61308d9e964c6f187e55496439e0d26582e26adcc519d6abdeef7da1a9f8f4c
                              SSDEEP:24576:+bnQK7ECKrvDBI1/jUHsvoCzA+7ZAkwVileDd2A0iM3/4UF+voC:DBW1/aunlikidX0iM3/pmd
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.................. ........@.. ....................... ............@................................

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x50d9a2
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0xBA9DB0CD [Tue Mar 19 05:29:49 2069 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x10d9500x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x10e0000x3a8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1100000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x10d9340x1c.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x10b9a80x10ba00False0.76949658454data7.62768729612IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x10e0000x3a80x400False0.3779296875data2.93439777021IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1100000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0x10e0580x34cdata

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2019
                              Assembly Version1.0.0.0
                              InternalNameSignatureHelp.exe
                              FileVersion1.0.0.0
                              CompanyName
                              LegalTrademarks
                              Comments
                              ProductNameControlVehicular
                              ProductVersion1.0.0.0
                              FileDescriptionControlVehicular
                              OriginalFilenameSignatureHelp.exe

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jul 20, 2021 08:31:53.965097904 CEST497251604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:54.017478943 CEST160449725185.140.53.253192.168.2.3
                              Jul 20, 2021 08:31:54.525213957 CEST497251604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:54.577574968 CEST160449725185.140.53.253192.168.2.3
                              Jul 20, 2021 08:31:55.091340065 CEST497251604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:55.143786907 CEST160449725185.140.53.253192.168.2.3
                              Jul 20, 2021 08:31:59.655571938 CEST497261604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:59.708025932 CEST160449726185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:00.213185072 CEST497261604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:00.271600962 CEST160449726185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:00.775748968 CEST497261604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:00.828226089 CEST160449726185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:04.840707064 CEST497271604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:04.894807100 CEST160449727185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:05.401160955 CEST497271604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:05.461515903 CEST160449727185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:05.963871002 CEST497271604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:06.016484976 CEST160449727185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:10.304269075 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.353842020 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.353945971 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.393405914 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.460695982 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.469439983 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.479995966 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.530076027 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.530152082 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.600259066 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.600338936 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.671350002 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719286919 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719321012 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719338894 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719355106 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719408035 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.719500065 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.768867970 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768899918 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768915892 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768932104 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768948078 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768963099 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768961906 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.768979073 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768994093 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.768996954 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.769011021 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.769037962 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818128109 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818166018 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818180084 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818192005 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818207979 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818221092 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818238974 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818254948 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818276882 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818294048 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818296909 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818310022 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818327904 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818346024 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818361044 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818370104 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818376064 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818392992 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818413019 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818437099 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868072033 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868103981 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868119001 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868134975 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868150949 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868165970 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868181944 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868211985 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868216991 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868230104 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868247032 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868263960 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868271112 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868307114 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868321896 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868339062 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868355036 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868374109 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868393898 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868410110 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868418932 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868460894 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868486881 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868530989 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868546963 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868566036 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868576050 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868583918 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868608952 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868654966 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868701935 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868702888 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868720055 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868735075 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868751049 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868768930 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868769884 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868788958 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868818045 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868860006 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.918724060 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918787956 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918804884 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918821096 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918837070 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918853998 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918874025 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918881893 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.918893099 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918908119 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.918911934 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918929100 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918937922 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.918945074 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918962002 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918971062 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.918979883 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.918996096 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919002056 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919011116 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919063091 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919075012 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919090986 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919143915 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919157028 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919203997 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919209957 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919228077 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919239044 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919313908 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919327974 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919331074 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919344902 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919357061 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919369936 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919373035 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919419050 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919429064 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919471979 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919507980 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919536114 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919560909 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919578075 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919585943 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919589996 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919604063 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919640064 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919665098 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919676065 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919684887 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919702053 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919733047 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919756889 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919775009 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919775963 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919820070 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919826984 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919888973 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919907093 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919919014 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919945002 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.919984102 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.919987917 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.920001984 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.920017958 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.920057058 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.920068026 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.920115948 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.920125961 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.920141935 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.920196056 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970232964 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970264912 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970277071 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970289946 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970305920 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970318079 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970330000 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970346928 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970365047 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970383883 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970402002 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970419884 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970434904 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970447063 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970467091 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970478058 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970484018 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970499992 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970534086 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970542908 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970585108 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970588923 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970607042 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970624924 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970639944 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970655918 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970670938 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970673084 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970691919 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970710039 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970725060 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970726013 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970741987 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970757008 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970758915 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970776081 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970792055 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970794916 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970803976 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970817089 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970828056 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970828056 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970844030 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970860004 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970863104 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970876932 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970887899 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970900059 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970905066 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970911980 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970923901 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970936060 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970948935 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.970961094 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.970971107 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.971004963 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.971034050 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.971048117 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.971456051 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.971477032 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.971488953 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.971546888 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.971600056 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021276951 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021305084 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021322012 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021337986 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021353006 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021368980 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021389008 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021397114 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021444082 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021444082 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021461964 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021497965 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021534920 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021552086 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021563053 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021590948 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021612883 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021629095 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021631956 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021652937 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021668911 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021672964 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021735907 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021737099 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021754026 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021802902 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021819115 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021826029 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021861076 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021871090 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021878004 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021893978 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021908998 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021924973 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021929026 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021941900 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021955967 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.021964073 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.021980047 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022093058 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022161007 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022212982 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022228956 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022258997 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022286892 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022301912 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022334099 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022367954 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022384882 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022399902 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022414923 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022417068 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022430897 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022447109 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022450924 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022466898 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022484064 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022495031 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022500038 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022516012 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022527933 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022533894 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022548914 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022563934 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022566080 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022577047 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022593021 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.022608042 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.022651911 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071458101 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071491957 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071511984 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071527958 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071543932 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071561098 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071577072 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071594000 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071609020 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071628094 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071645021 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071660995 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071666956 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071676970 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071693897 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071708918 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071724892 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071734905 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071741104 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071760893 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071774006 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071779966 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071798086 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071811914 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071813107 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071832895 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071845055 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071849108 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071865082 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071873903 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071882010 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071904898 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.071942091 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071959019 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.071985960 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072012901 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072046995 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072349072 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072367907 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072384119 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072429895 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072432041 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072448969 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072484016 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072495937 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072515011 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072532892 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072556973 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072560072 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072577000 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072592020 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072627068 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072635889 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072644949 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072664976 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072681904 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072696924 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072706938 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072712898 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072729111 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072743893 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072751999 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072762012 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072777033 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072789907 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072812080 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072824001 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072829008 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072846889 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072861910 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072876930 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072892904 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072895050 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072923899 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072942019 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072957993 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072968006 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.072983027 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.072998047 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.073000908 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073016882 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073034048 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073034048 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.073050976 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073060989 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.073071957 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073090076 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073121071 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.073137045 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073153973 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073168993 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073179960 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.073180914 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:11.073220015 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.073261023 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.805391073 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:11.875519991 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:12.694140911 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.005671978 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.055099010 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.055242062 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.066190958 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.131084919 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.131208897 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.200865984 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.200973034 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.250313044 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.251537085 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.320188999 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.490928888 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.668823957 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.717927933 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.761516094 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.775429010 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.825400114 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.826323032 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:17.876759052 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:17.917803049 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:18.087328911 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:18.175789118 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:18.325793982 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:18.412719011 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:18.446863890 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:18.534059048 CEST16044973084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:19.108097076 CEST497301604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.219490051 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.271436930 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.271538973 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.272542953 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.340934992 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.365076065 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.416007042 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.418199062 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.486531019 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.615398884 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.622101068 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.671885014 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.715126991 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.765435934 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.765721083 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.816287994 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.817090988 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.867681980 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:23.867763996 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:23.942657948 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:24.137904882 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:24.214061022 CEST16044973284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:25.138247013 CEST497321604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.109909058 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.161669970 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.162025928 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.162952900 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.224896908 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.225419998 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.232295036 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.232419968 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.294785023 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.295847893 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.346215963 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.347518921 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.422137022 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.537915945 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.538784981 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.589858055 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.637605906 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.695790052 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.697520971 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.747884989 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.748051882 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.799226046 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:30.840754032 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:30.935049057 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:31.022821903 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:31.201502085 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:31.282847881 CEST16044973684.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:32.218113899 CEST497361604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.340383053 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.390223026 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.390403986 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.409100056 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.469626904 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.469948053 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.522483110 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.524059057 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.602941036 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.723388910 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.724499941 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.776376963 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.825686932 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.875024080 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.875483990 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.928356886 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:36.928442001 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:36.977713108 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:37.028789043 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:37.188556910 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:37.262420893 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:37.262506008 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:37.332972050 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:38.264218092 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:38.325468063 CEST16044973984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:39.217567921 CEST497391604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:43.349104881 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:43.401549101 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:43.401705027 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:43.698532104 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:43.769139051 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:43.770260096 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:43.821073055 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:43.822213888 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:43.899221897 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:44.009311914 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:44.076196909 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:44.126450062 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:44.170034885 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:44.244200945 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:44.315807104 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:44.409653902 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:44.459506989 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:44.513906002 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:44.940713882 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:44.990885019 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:44.991013050 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:45.074376106 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:45.074462891 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:45.153100014 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:46.525062084 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:46.606529951 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:46.606599092 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:46.686752081 CEST16044974084.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:47.545871019 CEST497401604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:51.723594904 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:51.774697065 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:51.774956942 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:51.775772095 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:51.847773075 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:51.848073006 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:51.898633957 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:51.944789886 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:52.016938925 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:52.147716045 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:52.149188042 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:52.198945999 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:52.200870991 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:52.250700951 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:52.250880003 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:52.301019907 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:52.342782021 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:52.406059980 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:52.477669954 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:52.546447992 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:52.619462967 CEST16044974184.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:53.615047932 CEST497411604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:57.737243891 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:57.787097931 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:57.787249088 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:57.788268089 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:57.858114958 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:57.859163046 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:57.873730898 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:57.923351049 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:57.931186914 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:58.000627995 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:58.115310907 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:58.116570950 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:58.165659904 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:58.218018055 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:58.268387079 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:58.278549910 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:58.328669071 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:58.328849077 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:58.379321098 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:58.421281099 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:58.547096968 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:58.627263069 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:59.563355923 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:59.644889116 CEST16044974284.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:00.547533035 CEST497421604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:04.991517067 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.040874004 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.041014910 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.058990002 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.122812986 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.165975094 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.215590954 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.252434015 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.325982094 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.430243015 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.431050062 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.481734037 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.482804060 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.535258055 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.536916971 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.586817980 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:05.640518904 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.860265017 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:05.935724020 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:06.860517025 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:06.942975044 CEST16044974384.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:07.860285997 CEST497431604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.015211105 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.066433907 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.066569090 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.067334890 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.135422945 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.135736942 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.185427904 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.186541080 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.256408930 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.383320093 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.400727034 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.450504065 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.451819897 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.502283096 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.503453970 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.554471016 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.610043049 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.682069063 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:12.734930038 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.907707930 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:12.996336937 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:13.892725945 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:13.974545956 CEST16044974684.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:14.892837048 CEST497461604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.021534920 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.071460009 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.071634054 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.072428942 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.136800051 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.137278080 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.186758995 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.189253092 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.262810946 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.397857904 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.437395096 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.489605904 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.507220984 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.564373970 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.564572096 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.616866112 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:19.657392979 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.725964069 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:19.797686100 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:20.032963991 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:20.103589058 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:20.686141014 CEST16044974784.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:20.735600948 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:21.042959929 CEST497471604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.187738895 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.239279032 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.239491940 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.240535021 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.306814909 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.319459915 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.372754097 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.373939037 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.444587946 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.554593086 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.555810928 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.606566906 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.608227968 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.658956051 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.659171104 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:25.710299015 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:25.751902103 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:26.049154043 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:26.119381905 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:28.699197054 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:28.751902103 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:30.290985107 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:30.346138954 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:35.291394949 CEST16044974884.38.133.182192.168.2.3
                              Jul 20, 2021 08:33:35.346177101 CEST497481604192.168.2.384.38.133.182
                              Jul 20, 2021 08:33:36.706394911 CEST16044974884.38.133.182192.168.2.3

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jul 20, 2021 08:31:13.677877903 CEST4919953192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:13.728728056 CEST53491998.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:15.092024088 CEST5062053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:15.154357910 CEST53506208.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:16.082168102 CEST6493853192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:16.145386934 CEST53649388.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:16.925029993 CEST6015253192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:16.979285002 CEST53601528.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:17.419193029 CEST5754453192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:17.479557991 CEST53575448.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:17.817135096 CEST5598453192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:17.872905970 CEST53559848.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:19.979044914 CEST6418553192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:20.029664040 CEST53641858.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:20.833656073 CEST6511053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:20.883372068 CEST53651108.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:26.054384947 CEST5836153192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:26.108437061 CEST53583618.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:27.717922926 CEST6349253192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:27.767272949 CEST53634928.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:28.817941904 CEST6083153192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:28.870630980 CEST53608318.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:30.779994011 CEST6010053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:30.842333078 CEST53601008.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:32.134699106 CEST5319553192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:32.195046902 CEST53531958.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:33.238751888 CEST5014153192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:33.290930033 CEST53501418.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:34.206728935 CEST5302353192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:34.258846998 CEST53530238.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:35.285579920 CEST4956353192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:35.339217901 CEST53495638.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:36.106810093 CEST5135253192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:36.160732985 CEST53513528.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:37.100457907 CEST5934953192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:37.149971962 CEST53593498.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:38.370778084 CEST5708453192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:38.420017958 CEST53570848.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:39.174007893 CEST5882353192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:39.231282949 CEST53588238.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:48.136630058 CEST5756853192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:48.199537992 CEST53575688.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:51.481117010 CEST5054053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:51.554459095 CEST53505408.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:10.033478022 CEST5436653192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:10.093190908 CEST53543668.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:10.239372015 CEST5303453192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:10.301805019 CEST53530348.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:16.790425062 CEST5776253192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:16.850102901 CEST53577628.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:16.960113049 CEST5543553192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:17.026628017 CEST53554358.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:23.156908989 CEST5071353192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:23.218106031 CEST53507138.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:29.177911043 CEST5613253192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:29.238214970 CEST53561328.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:30.050033092 CEST5898753192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:30.106918097 CEST53589878.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:33.040863037 CEST5657953192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:33.099427938 CEST53565798.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:36.270360947 CEST6063353192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:36.328798056 CEST53606338.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:43.285545111 CEST6129253192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:43.346647978 CEST53612928.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:51.645318031 CEST6361953192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:51.704998970 CEST53636198.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:57.678112984 CEST6493853192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:57.735357046 CEST53649388.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:04.925019026 CEST6194653192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:04.985399008 CEST53619468.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:06.545713902 CEST6491053192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:06.612884045 CEST53649108.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:08.476099014 CEST5212353192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:08.551522970 CEST53521238.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:11.913871050 CEST5613053192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:11.963673115 CEST53561308.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:18.958626032 CEST5633853192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:19.011656046 CEST53563388.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:25.125401020 CEST5942053192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:25.185560942 CEST53594208.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Jul 20, 2021 08:32:10.239372015 CEST192.168.2.38.8.8.80xf5e8Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:16.790425062 CEST192.168.2.38.8.8.80xda52Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:23.156908989 CEST192.168.2.38.8.8.80x2592Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:30.050033092 CEST192.168.2.38.8.8.80xe404Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:36.270360947 CEST192.168.2.38.8.8.80x798aStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:43.285545111 CEST192.168.2.38.8.8.80xba51Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:51.645318031 CEST192.168.2.38.8.8.80xc6d4Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:57.678112984 CEST192.168.2.38.8.8.80x1088Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:04.925019026 CEST192.168.2.38.8.8.80xc933Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:11.913871050 CEST192.168.2.38.8.8.80x2465Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:18.958626032 CEST192.168.2.38.8.8.80x9d36Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:25.125401020 CEST192.168.2.38.8.8.80x7b7aStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Jul 20, 2021 08:32:10.301805019 CEST8.8.8.8192.168.2.30xf5e8No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:16.850102901 CEST8.8.8.8192.168.2.30xda52No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:23.218106031 CEST8.8.8.8192.168.2.30x2592No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:30.106918097 CEST8.8.8.8192.168.2.30xe404No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:36.328798056 CEST8.8.8.8192.168.2.30x798aNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:43.346647978 CEST8.8.8.8192.168.2.30xba51No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:51.704998970 CEST8.8.8.8192.168.2.30xc6d4No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:57.735357046 CEST8.8.8.8192.168.2.30x1088No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:04.985399008 CEST8.8.8.8192.168.2.30xc933No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:11.963673115 CEST8.8.8.8192.168.2.30x2465No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:19.011656046 CEST8.8.8.8192.168.2.30x9d36No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:25.185560942 CEST8.8.8.8192.168.2.30x7b7aNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)

                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              High Level Behavior Distribution

                              Click to dive into process behavior distribution

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:08:31:22
                              Start date:20/07/2021
                              Path:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\RFQ 10 UNIT.exe'
                              Imagebase:0x4a0000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              General

                              Start time:08:31:50
                              Start date:20/07/2021
                              Path:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Imagebase:0x370000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:08:31:51
                              Start date:20/07/2021
                              Path:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Imagebase:0xe70000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.485635523.0000000004706000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:08:32:05
                              Start date:20/07/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                              Imagebase:0x2e0000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 20%, ReversingLabs
                              Reputation:low

                              General

                              Start time:08:32:41
                              Start date:20/07/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0xc30000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >

                                Executed Functions

                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 30f724c9062484c59056fd518c321abe6318e40aeda2fca9c0c03a6e5f8d9ea4
                                • Instruction ID: 3f32a4f2cf7a918c78da748bf127495c6b217d87dad18a9cbc28be37b7aafdf1
                                • Opcode Fuzzy Hash: 30f724c9062484c59056fd518c321abe6318e40aeda2fca9c0c03a6e5f8d9ea4
                                • Instruction Fuzzy Hash: D7914C71C087899FCB12CFA4D850ACDBFB1FF49314F1A819AE814AB262D7359846CF51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 031E962E
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 6cfa6fd74dcdffd67fd3a01bd27e3280666a14ab7da549c425d49b22c941e05f
                                • Instruction ID: 8b7e5a3ae245548add7359e2538138415360d88793d5a914cd73f722755c9a5d
                                • Opcode Fuzzy Hash: 6cfa6fd74dcdffd67fd3a01bd27e3280666a14ab7da549c425d49b22c941e05f
                                • Instruction Fuzzy Hash: 9D7136B0A00B058FD724DF2AD54175ABBF5BF88314F04896ED48ADBB40DB79E845CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031EFD0A
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 212634ab8594b16f6ef9004e62d3e05b7d7a0b63f4cc6e74c2091506e8e81945
                                • Instruction ID: 0811c4e006fce039ff74eb78cb64dcc70217888f26470769c54620f1585d851f
                                • Opcode Fuzzy Hash: 212634ab8594b16f6ef9004e62d3e05b7d7a0b63f4cc6e74c2091506e8e81945
                                • Instruction Fuzzy Hash: 7C5110B1D04348DFDB14DFA9D880ADEBFB6BF48314F25816AE819AB211D7719885CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031EFD0A
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: aa138b1f6be1154d83dfc35d6cc7f1f4cf7fd6b27f7297a30f373fdade945e21
                                • Instruction ID: d277b1a5f4f03418e4880bf6be6f03d36be4481c615eff30b5ada31f0bc6a172
                                • Opcode Fuzzy Hash: aa138b1f6be1154d83dfc35d6cc7f1f4cf7fd6b27f7297a30f373fdade945e21
                                • Instruction Fuzzy Hash: 3051BEB1D00709DFDB14CFA9D884ADEBBB5BF48314F25812AE819AB210D7759985CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,031EBCC6,?,?,?,?,?), ref: 031EBD87
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 863d1dd7a2dc8944bb80c82fa84fd0ef4be4ca19bd0aa06c485f8a00d54e91f1
                                • Instruction ID: c798cde1708201780d4c5e0d65fc86804fb4dde3417660cdc450086e1524ff8a
                                • Opcode Fuzzy Hash: 863d1dd7a2dc8944bb80c82fa84fd0ef4be4ca19bd0aa06c485f8a00d54e91f1
                                • Instruction Fuzzy Hash: 292105B59042489FDB10CFAAD884ADEFBF9FB48324F15801AE918B3310D375A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,031EBCC6,?,?,?,?,?), ref: 031EBD87
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 46ff4293f19c8b3fa6a3f8867e191a6c129762d53f9078a300bf93e4cdf1f165
                                • Instruction ID: 7495a465f55a6449a452fe19be8302ee4a8b1ff36322249ab2730c90e82a6080
                                • Opcode Fuzzy Hash: 46ff4293f19c8b3fa6a3f8867e191a6c129762d53f9078a300bf93e4cdf1f165
                                • Instruction Fuzzy Hash: 6C21D4B59042489FDB10DFAAD984ADEFBF5FB48324F14841AE915A3310D375A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031E96A9,00000800,00000000,00000000), ref: 031E98BA
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 5d1a45eee1fb193f14f6829054864f868ced6983d0b587ea85362ad4c602f6d8
                                • Instruction ID: 935f699e6845ef3b3ecfe238d3627dc467db0090f4f40ff62b0e3fd1f8e3e2c2
                                • Opcode Fuzzy Hash: 5d1a45eee1fb193f14f6829054864f868ced6983d0b587ea85362ad4c602f6d8
                                • Instruction Fuzzy Hash: 591103B6C006099FDB10DFAAC444BDEFBF8AB48324F15842AE419A7610C379A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031E96A9,00000800,00000000,00000000), ref: 031E98BA
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 4de97f715b1550c3565a419d3692ff5e415544d01469be186609a2d2a4f3f094
                                • Instruction ID: 171e207944041cb0445002c44bad5ab38b7330b9c1420895228f4d9e4fb62656
                                • Opcode Fuzzy Hash: 4de97f715b1550c3565a419d3692ff5e415544d01469be186609a2d2a4f3f094
                                • Instruction Fuzzy Hash: 4411F2B69006098BDB10DF9AC444BDEFBF4AB48324F14842AE919A7610C379A945CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,031EFE28,?,?,?,?), ref: 031EFE9D
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: LongWindow
                                • String ID:
                                • API String ID: 1378638983-0
                                • Opcode ID: 0e31693b643656ab074500f05eeab8d47de32fea92d4db01cf378b5f509f5ffb
                                • Instruction ID: f783a9f082b77bf86f386e8ed4e3763a67e5aab772528c93e9b8a56a788e6ec7
                                • Opcode Fuzzy Hash: 0e31693b643656ab074500f05eeab8d47de32fea92d4db01cf378b5f509f5ffb
                                • Instruction Fuzzy Hash: 8E1143B58002488FDB20DF9AC484BDEFBF8EB48324F15841AE814A3301C375A940CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 031E962E
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 086016e31d9b79f0cb51b8d717c2cb804e513e65dcf69d7159fd5ac2756c9e49
                                • Instruction ID: 2e72c239a3ce06d4e571ca49efef81344258c787f18a44f82f23c59748a123f7
                                • Opcode Fuzzy Hash: 086016e31d9b79f0cb51b8d717c2cb804e513e65dcf69d7159fd5ac2756c9e49
                                • Instruction Fuzzy Hash: C811E0B5C006498FDB20DF9AD444BDEFBF5AF88224F14842AD819B7700C379A545CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,031EFE28,?,?,?,?), ref: 031EFE9D
                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID: LongWindow
                                • String ID:
                                • API String ID: 1378638983-0
                                • Opcode ID: 1ada39791aa8876a42b16474a840905f20b978c9a440f3fbe37df7d4944fdc19
                                • Instruction ID: 9d508200bdc00735fab78eab4ad2c7e6b176e27d8c147c801b859ea79c954b8a
                                • Opcode Fuzzy Hash: 1ada39791aa8876a42b16474a840905f20b978c9a440f3fbe37df7d4944fdc19
                                • Instruction Fuzzy Hash: 401133B58006488FDB20DF9AD584BEEBBF8EB88324F15845AE915B3341C375A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.479921025.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a2bbb19118b4c5f3f92bac200655692bce58dd60d270f4b07b6da952dceb64ac
                                • Instruction ID: faefb01a7410aa623bf37ac28ffa51fcacb0af08404979750f21d412993aaa0a
                                • Opcode Fuzzy Hash: a2bbb19118b4c5f3f92bac200655692bce58dd60d270f4b07b6da952dceb64ac
                                • Instruction Fuzzy Hash: D22128B1504244DFCB05DF94D9C0B26BB65FBC8328F68C6A9E9058B246C336E516CBE1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.479921025.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0b8a00714c2c62d0425a16cc0ca65f082cb2d4f9ed5533ff6dfd1c8996f9807d
                                • Instruction ID: 6be83e1a152d71a94c6994fa8b1fb56aa5f374e0f0faedca96fb577290ca0281
                                • Opcode Fuzzy Hash: 0b8a00714c2c62d0425a16cc0ca65f082cb2d4f9ed5533ff6dfd1c8996f9807d
                                • Instruction Fuzzy Hash: F62136B1504244DFDB01DF94D9C0B26BF65FBC4328F688668E9068B246C336D916CBE1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.479956666.000000000184D000.00000040.00000001.sdmp, Offset: 0184D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c8eb7e092ea2ad3a2925c0168ccbd86aea834e653168873aa4cf8a231d90f0c7
                                • Instruction ID: e883f9ef42802f2a67d9506af48db7e95dcd5decd162df322ac2f588dc76ad0f
                                • Opcode Fuzzy Hash: c8eb7e092ea2ad3a2925c0168ccbd86aea834e653168873aa4cf8a231d90f0c7
                                • Instruction Fuzzy Hash: B0213771504248DFCB15DFA4D9C0B26BB65FB94358F20C6ADE80A8B346CB3AD907CB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.479921025.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f000892e25e84a9f7bae80bbc487d9c58b7670cd60742accc6e811f243b368dc
                                • Instruction ID: 3054f10b55b580e27c04a365d9091598ea9c96b270cb1c60d12b78b0669a7d14
                                • Opcode Fuzzy Hash: f000892e25e84a9f7bae80bbc487d9c58b7670cd60742accc6e811f243b368dc
                                • Instruction Fuzzy Hash: 56219D76504280DFCB16CF54D9C4B16BF71FB84320F28C2A9DC084B65AC33AE56ACBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.479921025.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                • Instruction ID: 13e11d64d66a7424d43e4396d566317c02cb89a5f2ff3aaf1f113eddddc8f22c
                                • Opcode Fuzzy Hash: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                • Instruction Fuzzy Hash: 9911B176804280CFDB12CF58D5C4B16BF72FB84324F2886A9E9054B657C336D55ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.479956666.000000000184D000.00000040.00000001.sdmp, Offset: 0184D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 088bb676d9cc58b7b5583b2d12a323ce7eb7cea81b0eb8fe1e3b9802e29bf41a
                                • Instruction ID: e6aef9d850d9115ffdec3f335c96010bd93810ef4a51858e0e2cd875c6809942
                                • Opcode Fuzzy Hash: 088bb676d9cc58b7b5583b2d12a323ce7eb7cea81b0eb8fe1e3b9802e29bf41a
                                • Instruction Fuzzy Hash: B711BB75504284CFCB12CF58D5C4B15FBA1FB84324F28C6AAD8098B656C33AD54ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions

                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: db078228a1e3f2f1d34ccc17813184107e2c44e3202d382a18cb47d1c590020b
                                • Instruction ID: e983f4e20a9cc43bae06cf337e30e77f79ff09668cd2fb6057ff6b3c24d261b5
                                • Opcode Fuzzy Hash: db078228a1e3f2f1d34ccc17813184107e2c44e3202d382a18cb47d1c590020b
                                • Instruction Fuzzy Hash: 1512E4F14137668BE330DF65F8985893BB1B745328F91420AD2612FAD9D7B8134ACF86
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9df1558298c43a62e9ff09629d07d93d765e938d0990ece3fca741dea2c885f2
                                • Instruction ID: 7f068ac066782c973b6d144523576adbcf687101dc00fdd883253f7dad0dc707
                                • Opcode Fuzzy Hash: 9df1558298c43a62e9ff09629d07d93d765e938d0990ece3fca741dea2c885f2
                                • Instruction Fuzzy Hash: 1EA18C36E00A198FCF15DFB5D8845DDBBF6FF89300B15856AE805AB220EB72A955CB40
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000008.00000002.480398905.00000000031E0000.00000040.00000001.sdmp, Offset: 031E0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c610ebc699865f20c1face0afbec8d50b85c923a50e04d6e2a00c34dcd2f5016
                                • Instruction ID: 89dbcccee047bd7587698ce1001a112e050bc14ddfdf5f3432009afd8b672860
                                • Opcode Fuzzy Hash: c610ebc699865f20c1face0afbec8d50b85c923a50e04d6e2a00c34dcd2f5016
                                • Instruction Fuzzy Hash: C5C139F18137669BE320DF64F8885897BB1FB85328F51430AD2612FAD8D7B4124ACF95
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Executed Functions

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 0309B730
                                • GetCurrentThread.KERNEL32 ref: 0309B76D
                                • GetCurrentProcess.KERNEL32 ref: 0309B7AA
                                • GetCurrentThreadId.KERNEL32 ref: 0309B803
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: bdebe29961e3e1bf49e7183115309fff2031036e52bb56ff726a5791aab8357b
                                • Instruction ID: ed83b1c67471f565b5789e8b041ca6160726ab83bd21f5f248f4b974232018a3
                                • Opcode Fuzzy Hash: bdebe29961e3e1bf49e7183115309fff2031036e52bb56ff726a5791aab8357b
                                • Instruction Fuzzy Hash: 5B5155B09012488FDB10DFAAD988BEEBBF1AF48314F24855AE019A7360DB749845CF61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 0309B730
                                • GetCurrentThread.KERNEL32 ref: 0309B76D
                                • GetCurrentProcess.KERNEL32 ref: 0309B7AA
                                • GetCurrentThreadId.KERNEL32 ref: 0309B803
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 94f97f647480b56866c02924311f91a58bfd758545ccbfc693773feb69d8b71c
                                • Instruction ID: 1846d39651d38228c16c61b08927d4923b808a068cc91b3c64a19d6878be7e8c
                                • Opcode Fuzzy Hash: 94f97f647480b56866c02924311f91a58bfd758545ccbfc693773feb69d8b71c
                                • Instruction Fuzzy Hash: F35154B0A012488FDB10DFAAD988BDEFBF1BF48314F24855AE019A7360DB749844CF65
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aec608d691296aa51a5d450c3e30f5909efbbd91043625481116548ddf8b7267
                                • Instruction ID: d222708e2404195e2bd83197d4520d1180e133b7ba19f61fd6a849006300524d
                                • Opcode Fuzzy Hash: aec608d691296aa51a5d450c3e30f5909efbbd91043625481116548ddf8b7267
                                • Instruction Fuzzy Hash: B7228278E44205CFCB24DF98D4A8ABEBBB2FB89320F548155DD5267764C734E882CB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0309962E
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 4ed1254e0d51f6720136e9ae045e44dc02162961a0e01d086aaa26739f284035
                                • Instruction ID: 64afdeb87213102115251c27a2d329aa1721b1bbb9a7043fb835fbb835cea393
                                • Opcode Fuzzy Hash: 4ed1254e0d51f6720136e9ae045e44dc02162961a0e01d086aaa26739f284035
                                • Instruction Fuzzy Hash: B7712470A01B058FEB64DF2AD440BABB7F5BF88204F04896ED48ADBB50D734E845CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0309FD0A
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: d8e8d605dd6cc327a733a68a1b6f711f13b47a86e1aa4e75590a48cbc0f56d9e
                                • Instruction ID: 23777d278d73642e65990d7f7b3e98ee5dfcc5e0ee76269aaaa3a1e58a237b01
                                • Opcode Fuzzy Hash: d8e8d605dd6cc327a733a68a1b6f711f13b47a86e1aa4e75590a48cbc0f56d9e
                                • Instruction Fuzzy Hash: 2B6134B1C05249AFDF05CFA9D880ADDBFB6FF48314F19816AE808AB222C7719854CF50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0309FD0A
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: c22efb30bdb863105ddaf4c8545a623f38078801d18f9238a070f735276a81e1
                                • Instruction ID: 903d4bb6b1904fee168261a5fe8609bddbdf50b741a65b842d9439d3339aa422
                                • Opcode Fuzzy Hash: c22efb30bdb863105ddaf4c8545a623f38078801d18f9238a070f735276a81e1
                                • Instruction Fuzzy Hash: F341A0B1D013099FDF14CF9AD884ADEBBB6BF48314F24812AE819AB210D7749945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 056546B1
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: b0cd503b822c6429ceec5be79bc88d34e3df4dd36adaa0473a62312e4ed29e08
                                • Instruction ID: 1c7788cf92d8b94a2e35b5d17d9b6bf2bc1e3738a80f82f576a53aaafb52770e
                                • Opcode Fuzzy Hash: b0cd503b822c6429ceec5be79bc88d34e3df4dd36adaa0473a62312e4ed29e08
                                • Instruction Fuzzy Hash: 2D41D2B0C0461CCFDB24DFA9C844B9DBBB5BF49319F2080A9D509AB251DB75598ACF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 056546B1
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: e3077ce69bf37794a8633fd42bf718a5928361ea45a38156c20e0ca97da0a505
                                • Instruction ID: de4e78757b1cc6a8e69d571006b1f111441361dc05b374418842f00af1a3f4c5
                                • Opcode Fuzzy Hash: e3077ce69bf37794a8633fd42bf718a5928361ea45a38156c20e0ca97da0a505
                                • Instruction Fuzzy Hash: 7241F3B0C04218CFDF24DFA9C844BCEBBB1BF49318F2180A9D509AB251DB756986CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05652531
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: c096bf46b071542042c3cfed60f6db1460563bdd15159cb5655e93d2907654ec
                                • Instruction ID: 5657f64607c6daa17e6fbe199d8a664f5b4b3a06ef2136928c11ead5aff67b2b
                                • Opcode Fuzzy Hash: c096bf46b071542042c3cfed60f6db1460563bdd15159cb5655e93d2907654ec
                                • Instruction Fuzzy Hash: 33413CB89003058FDB14CF99C458BAABBF6FF88324F14C459E919AB721D774A941CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 0565B957
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: CreateFromIconResource
                                • String ID:
                                • API String ID: 3668623891-0
                                • Opcode ID: 9c5efef96c3ed16b5d3fc5150c8a970797409d4331dc14a14642d012d5841344
                                • Instruction ID: bef89c50e33f6b1314e088f65647a33cadac1a57603963920173fa4c47cf2fc7
                                • Opcode Fuzzy Hash: 9c5efef96c3ed16b5d3fc5150c8a970797409d4331dc14a14642d012d5841344
                                • Instruction Fuzzy Hash: 3E31AD72904349AFCB11DFA9D800BEABFF8EF09320F04845AF955A7661C7359850DFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0309BD87
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 2304aacae5b43208bf7f1d4bfd231fe60b7d53814c1b8df1daa636fdbe9b0797
                                • Instruction ID: 7383f71d1053c22d9b268fe559a0115679a560441d7d61f522812f0f43818cd1
                                • Opcode Fuzzy Hash: 2304aacae5b43208bf7f1d4bfd231fe60b7d53814c1b8df1daa636fdbe9b0797
                                • Instruction Fuzzy Hash: F921E3B59012489FDB10CFAAE884AEEFBF4EB48324F14841AE954A3310D374A955CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0309BD87
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: b41896603c54ae889249f10cab6b7b5063be49ddeed5b30516a4f885e7c6b689
                                • Instruction ID: cc71883f7a94809422b6cc5d5bda6f9efe787a49332c80d8e1047210219f8464
                                • Opcode Fuzzy Hash: b41896603c54ae889249f10cab6b7b5063be49ddeed5b30516a4f885e7c6b689
                                • Instruction Fuzzy Hash: 0C21D5B5901208DFDB10DFAAD984ADEFBF8FB48324F14841AE954A3310D374A944DFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,030996A9,00000800,00000000,00000000), ref: 030998BA
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: a85bd30062a61a0436b674f9b222f90bd4cacb316ac73fde9042a88208b077d3
                                • Instruction ID: 6f86ac97d9ba23d4d5b59a7871bab32280f1c07889463e198f12ca3b535bad9e
                                • Opcode Fuzzy Hash: a85bd30062a61a0436b674f9b222f90bd4cacb316ac73fde9042a88208b077d3
                                • Instruction Fuzzy Hash: 721133B69002088FDB10DF9AC444BDEFBF4EB48324F04846EE415A7600C375A945CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,030996A9,00000800,00000000,00000000), ref: 030998BA
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 739d047f82e670b21615ec4680ba70d90807100b456d2135f9da6e55cf69dc8a
                                • Instruction ID: 1edd2f858f5043681d6148cb7139d41bdaabd6604b29514aef923d42fa7d9d56
                                • Opcode Fuzzy Hash: 739d047f82e670b21615ec4680ba70d90807100b456d2135f9da6e55cf69dc8a
                                • Instruction Fuzzy Hash: 341103B6D002098FDB20CFAAD444BEEFBF4AB88314F15852EE415A7610C375A545CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 0565B957
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: CreateFromIconResource
                                • String ID:
                                • API String ID: 3668623891-0
                                • Opcode ID: fb52836b0c3318eebe7b60495c1cf24180e8fe30e40b40c8cf0f4ba3bb994d2a
                                • Instruction ID: 3a9215ff6c9ccef38710c131fdbf740138bea74951dd5b68bccfae6f7b77320e
                                • Opcode Fuzzy Hash: fb52836b0c3318eebe7b60495c1cf24180e8fe30e40b40c8cf0f4ba3bb994d2a
                                • Instruction Fuzzy Hash: DC1146B1800249DFDB10DFAAD844BDEBFF8EF48324F14841AE955A3220C335A954DFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,015953E8,00000000,?), ref: 0565E73D
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 8feb4bcd80b7260609dc27eed75b50a6eb06d4ec56e1226e6af81f64f18ce8d0
                                • Instruction ID: 715ee3650aa7c8c9bc794450f53dc3816c90df46069935f2ca7b759fcb562156
                                • Opcode Fuzzy Hash: 8feb4bcd80b7260609dc27eed75b50a6eb06d4ec56e1226e6af81f64f18ce8d0
                                • Instruction Fuzzy Hash: 72115EB18003099FDB10DFA9D845BEEBBF8FB48324F108559E914A7750C375A945CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,015953E8,00000000,?), ref: 0565E73D
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: f9a98bf5003c941b5c381b23904834d039c098d85bbdb560cc7d42dcb6699075
                                • Instruction ID: 7165fcc90fad0970fffa821429b4d12c02595c8c8bab87b4b165756a90514ab3
                                • Opcode Fuzzy Hash: f9a98bf5003c941b5c381b23904834d039c098d85bbdb560cc7d42dcb6699075
                                • Instruction Fuzzy Hash: 66116AB58003099FDB10DF9AC845BEEBBF8FB48320F10845AE914A3311C374AA44CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,00000018,00000001,?), ref: 0565D29D
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 55edd5ad550e7ee2c042664b0af974d081abb335b699e4ae0c9e621411f7842d
                                • Instruction ID: 19f400b45bfc58fbc0890743106ff62c815f4bd736020fd9089975b8499d40b5
                                • Opcode Fuzzy Hash: 55edd5ad550e7ee2c042664b0af974d081abb335b699e4ae0c9e621411f7842d
                                • Instruction Fuzzy Hash: 5E11F5B5800209DFDB20DF99D984BEEBBF4FB48324F208519E955A3750C375A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SendMessageW.USER32(00000000,0000020A,?,00000000,?,?,?,?,0565226A,?,00000000,?), ref: 0565C435
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: b5c5f56981b4bd201e1170d1f5c56148f5870e146c2bb3c1a2998813904af054
                                • Instruction ID: fd5a5bb7b2b3d6bd356f4cbb41327ed769284aea980c30f8c2d4b7e99d99cd1a
                                • Opcode Fuzzy Hash: b5c5f56981b4bd201e1170d1f5c56148f5870e146c2bb3c1a2998813904af054
                                • Instruction Fuzzy Hash: C21133B58003089FDB20DF99D885BEEBBF8FB48324F10851AE955A3710C375A985CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0309962E
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: a39ab8c65a302c37772c44c06f00deece924bb740a0b223c15c6acfaea73db72
                                • Instruction ID: 67db9ff5d7d878375559d56d42ec6d3e16c57e85102553d2f1b77b828d2ade6e
                                • Opcode Fuzzy Hash: a39ab8c65a302c37772c44c06f00deece924bb740a0b223c15c6acfaea73db72
                                • Instruction Fuzzy Hash: E211E0B6D006498FDB20DF9AD844BDEFBF4AF88224F15842AD819A7610C375A545CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SendMessageW.USER32(00000000,0000020A,?,00000000,?,?,?,?,0565226A,?,00000000,?), ref: 0565C435
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: ae10c44765a04f4eab40c810d64090a804cc495ad74a049e9a53cd8fa28a45a6
                                • Instruction ID: f617370a483feb615c9a25108ea3392f01d0fd05b7f01d8def8e8d517a1c5dc3
                                • Opcode Fuzzy Hash: ae10c44765a04f4eab40c810d64090a804cc495ad74a049e9a53cd8fa28a45a6
                                • Instruction Fuzzy Hash: D11103B58003489FDB20DF9AD884BEEBBF8EB48324F108419E955A7710C375A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SendMessageW.USER32(?,?,?,?,?,?,?,0565BC49,?,?,00000000), ref: 0565BCBD
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: fb8c96a4bbafec66f43aea45b245ced9cad38c8457ccf341f9ed1da3fb2ded80
                                • Instruction ID: 9834d26faba840e29c1427d12137162a8beb87afca72ac295517b001ae7434d9
                                • Opcode Fuzzy Hash: fb8c96a4bbafec66f43aea45b245ced9cad38c8457ccf341f9ed1da3fb2ded80
                                • Instruction Fuzzy Hash: AD1122B58003489FCB20DF9AD884BEEBBF8FB48320F108419E915A3710C374A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,00000018,00000001,?), ref: 0565D29D
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 777678bd914d31a3d8c8d78e0d878a104925b6e51cd2d0097128f5cc4cf61092
                                • Instruction ID: 02f42f66411cc9f7ec5cb812434c0bee592c8054b880dedf0ee752f5d34fed28
                                • Opcode Fuzzy Hash: 777678bd914d31a3d8c8d78e0d878a104925b6e51cd2d0097128f5cc4cf61092
                                • Instruction Fuzzy Hash: 881103B58043089FDB20DF9AD984BDEBBF8EB48324F108419E915B7751C375AA84CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SetWindowLongW.USER32(?,?,?), ref: 0309FE9D
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: LongWindow
                                • String ID:
                                • API String ID: 1378638983-0
                                • Opcode ID: 28aa5950f236ba69b0fd006190b7b2259c9b07b22d4f9a2575df887b28297d1d
                                • Instruction ID: 9040228c72777d876702479c2cc8438ac4f431e62b925240667b4265d7f8a38d
                                • Opcode Fuzzy Hash: 28aa5950f236ba69b0fd006190b7b2259c9b07b22d4f9a2575df887b28297d1d
                                • Instruction Fuzzy Hash: AC1103B58002099FDB20DF9AD585BDEFBF4EB88324F14855AE815B3301C374A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • OleInitialize.OLE32(00000000), ref: 0565F435
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: 81193fc3131e5b5989abeca57ce73228579a60b47dcbf747dd5fa0343d2f0521
                                • Instruction ID: cb7dd57a3b63a17190e3bd643804654017834d1896f384f79108b2cc5d57f71b
                                • Opcode Fuzzy Hash: 81193fc3131e5b5989abeca57ce73228579a60b47dcbf747dd5fa0343d2f0521
                                • Instruction Fuzzy Hash: C311F2B19002498ECB20DFAAD448BDEFBF4AB48324F118519E559A3710C375A945CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • OleInitialize.OLE32(00000000), ref: 0565F435
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: bfb26bde15ddf81fff351405aad0f4789d2f5f2e34af88d44328366c96687b02
                                • Instruction ID: 5d8760ba88acd7127f393e23539d0db5148236a19edef64b8b88f3525659aa7a
                                • Opcode Fuzzy Hash: bfb26bde15ddf81fff351405aad0f4789d2f5f2e34af88d44328366c96687b02
                                • Instruction Fuzzy Hash: 3E1103B19042488FDB20DFAAD448BDEFBF8EB48364F108459E959A7710C374A945CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SendMessageW.USER32(?,?,?,?,?,?,?,0565BC49,?,?,00000000), ref: 0565BCBD
                                Memory Dump Source
                                • Source File: 00000018.00000002.403448203.0000000005650000.00000040.00000001.sdmp, Offset: 05650000, based on PE: false
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 836f12a18605c89ed5eb33960b693b1c62bcfdd31c67783b98de6881ab6cce73
                                • Instruction ID: 8f4da026d157bd3cb4521656b484a1138e88b9722d48326fdc27abec6254d3c2
                                • Opcode Fuzzy Hash: 836f12a18605c89ed5eb33960b693b1c62bcfdd31c67783b98de6881ab6cce73
                                • Instruction Fuzzy Hash: 6111F2B58006499FDB20DF9AD884BEEBBF4FB48324F108419E815A7710C374A984CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SetWindowLongW.USER32(?,?,?), ref: 0309FE9D
                                Memory Dump Source
                                • Source File: 00000018.00000002.402245200.0000000003090000.00000040.00000001.sdmp, Offset: 03090000, based on PE: false
                                Similarity
                                • API ID: LongWindow
                                • String ID:
                                • API String ID: 1378638983-0
                                • Opcode ID: 2d96c1fab1e40a14691bcfbb0dc4a1614b119b286f3dc0138d09f24af830f62b
                                • Instruction ID: 958f3dd6be8f6e6215ba7979357bbbbc9da2a52d27ec0310f6cda39bc5535c35
                                • Opcode Fuzzy Hash: 2d96c1fab1e40a14691bcfbb0dc4a1614b119b286f3dc0138d09f24af830f62b
                                • Instruction Fuzzy Hash: 801112B58002099FDB20DF9AD984BDFFBF8EB48324F10841AE815A3301C374A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000018.00000002.401708741.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8dc4599df492e1736306abddfa68427e50b23f4a55fa06622bac514891f7670e
                                • Instruction ID: 5ed9fc68df4e9091e86ef9085574ec12925130a3de8cd445418f0e48a6178e3e
                                • Opcode Fuzzy Hash: 8dc4599df492e1736306abddfa68427e50b23f4a55fa06622bac514891f7670e
                                • Instruction Fuzzy Hash: 752128B1904240DFDB15DF94D9C4B27BF65FB84328F24856EEA050B326C336E856CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000018.00000002.401738523.000000000150D000.00000040.00000001.sdmp, Offset: 0150D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 38ade38c46d8b9618fa0b23329518cc1de345b4bd27d37e1d46317a13762e629
                                • Instruction ID: b486d149595d2614e1a62630df849f2d7af67a8fa7a6bc1c39716491db33db62
                                • Opcode Fuzzy Hash: 38ade38c46d8b9618fa0b23329518cc1de345b4bd27d37e1d46317a13762e629
                                • Instruction Fuzzy Hash: DA2103B1504240DFDB12DFE4D9D0B26BBB5FB84354F20C9A9E80E4F286D336D806CA61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000018.00000002.401738523.000000000150D000.00000040.00000001.sdmp, Offset: 0150D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 155a72ce5130a288f83398082d185fedecf80211fd3a7804a7f21dc760d5515d
                                • Instruction ID: 959b2c1955fc3de441e0c51a65b5e0379f10f1e4c1eb9a122c98437005091dd4
                                • Opcode Fuzzy Hash: 155a72ce5130a288f83398082d185fedecf80211fd3a7804a7f21dc760d5515d
                                • Instruction Fuzzy Hash: 862180755093808FCB13CFA4D990B15BF71FB46214F28C5DAD8498F697C33A984ACB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000018.00000002.401708741.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                • Instruction ID: 351acec74e4dbbe4dbc14ccc6fa0a5c7a930c304203ac704d738e64af1f9374a
                                • Opcode Fuzzy Hash: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                • Instruction Fuzzy Hash: 14119D76804280CFDB12CF58D9C4B16BF61FB84324F2486AED9050A726C33AD45ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions