Loading ...

Play interactive tourEdit tour

Windows Analysis Report ORDER TSA-A090621B.exe

Overview

General Information

Sample Name:ORDER TSA-A090621B.exe
Analysis ID:451105
MD5:f5d3b895f4109e09f8918fc52147d154
SHA1:e4fe29023bd9af1916d7c12197949ddaed424e8b
SHA256:9713a28e0645cc77089dfd921118db8827de0a8b7e8196d653da2002646bd3cf
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • ORDER TSA-A090621B.exe (PID: 3980 cmdline: 'C:\Users\user\Desktop\ORDER TSA-A090621B.exe' MD5: F5D3B895F4109E09F8918FC52147D154)
    • ORDER TSA-A090621B.exe (PID: 5464 cmdline: C:\Users\user\Desktop\ORDER TSA-A090621B.exe MD5: F5D3B895F4109E09F8918FC52147D154)
    • ORDER TSA-A090621B.exe (PID: 5692 cmdline: C:\Users\user\Desktop\ORDER TSA-A090621B.exe MD5: F5D3B895F4109E09F8918FC52147D154)
  • dhcpmon.exe (PID: 5228 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: F5D3B895F4109E09F8918FC52147D154)
    • dhcpmon.exe (PID: 2476 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: F5D3B895F4109E09F8918FC52147D154)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5fee:$x1: NanoCore.ClientPluginHost
  • 0x602b:$x2: IClientNetworkHost
00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x5fee:$x2: NanoCore.ClientPluginHost
  • 0x9441:$s4: PipeCreated
  • 0x6018:$s5: IClientLoggingHost
00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x8ba5:$x1: NanoCore.ClientPluginHost
  • 0x8bd2:$x2: IClientNetworkHost
00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x8ba5:$x2: NanoCore.ClientPluginHost
  • 0x9b74:$s2: FileCommand
  • 0xe576:$s4: PipeCreated
  • 0x8bbf:$s5: IClientLoggingHost
00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Click to see the 46 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x59eb:$x1: NanoCore.ClientPluginHost
    • 0x5b48:$x2: IClientNetworkHost
    6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x59eb:$x2: NanoCore.ClientPluginHost
    • 0x6941:$s3: PipeExists
    • 0x5be1:$s4: PipeCreated
    • 0x5a05:$s5: IClientLoggingHost
    6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x5b99:$x1: NanoCore.ClientPluginHost
    • 0x5bb3:$x2: IClientNetworkHost
    6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x5b99:$x2: NanoCore.ClientPluginHost
    • 0x6bce:$s4: PipeCreated
    • 0x5b86:$s5: IClientLoggingHost
    6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xb184:$x1: NanoCore.ClientPluginHost
    • 0xb1b1:$x2: IClientNetworkHost
    Click to see the 126 entries

    Sigma Overview

    AV Detection:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Multi AV Scanner detection for domain / URLShow sources
    Source: dedicatedlambo9.ddns.netVirustotal: Detection: 6%Perma Link
    Source: dedicatedlambo9.ddns.netVirustotal: Detection: 6%Perma Link
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 17%
    Multi AV Scanner detection for submitted fileShow sources
    Source: ORDER TSA-A090621B.exeVirustotal: Detection: 20%Perma Link
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY
    Machine Learning detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Machine Learning detection for sampleShow sources
    Source: ORDER TSA-A090621B.exeJoe Sandbox ML: detected
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpackAvira: Label: TR/NanoCore.fadte
    Source: 21.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpackAvira: Label: TR/NanoCore.fadte
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: ORDER TSA-A090621B.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: ORDER TSA-A090621B.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: dedicatedlambo9.ddns.net
    Source: Malware configuration extractorURLs: 185.140.53.253
    Uses dynamic DNS servicesShow sources
    Source: unknownDNS query: name: dedicatedlambo9.ddns.net
    Source: global trafficTCP traffic: 192.168.2.3:49725 -> 185.140.53.253:1604
    Source: global trafficTCP traffic: 192.168.2.3:49732 -> 84.38.133.182:1604
    Source: Joe Sandbox ViewIP Address: 185.140.53.253 185.140.53.253
    Source: Joe Sandbox ViewASN Name: DATACLUB-NL DATACLUB-NL
    Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownDNS traffic detected: queries for: dedicatedlambo9.ddns.net
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: http://google.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223095895.0000000005EEE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/c
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223387249.0000000005EC9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmla-d
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomF
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdr
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comonyd
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comueTF
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219349774.000000000163D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219531458.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn#
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219748597.0000000005EB8000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/s
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnA
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnU
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219326151.0000000005EBE000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnd
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224689665.0000000005EC3000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmp, ORDER TSA-A090621B.exe, 00000000.00000003.221519161.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/71
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/V
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0d
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/_
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/arge
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/71
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/M
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ns.
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vau
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vnoi
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comD
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comc
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comd
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comx.
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comn
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.delar
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6af0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b6e8a4.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.79d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.3485ab4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.2a49684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.5bb0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b64c9f.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.495469070.000000000478F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.495497287.00000000047A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Initial sample is a PE file and has a suspicious nameShow sources
    Source: initial sampleStatic PE information: Filename: ORDER TSA-A090621B.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 6_2_017CE4716_2_017CE471
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 6_2_017CE4806_2_017CE480
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_010FE47121_2_010FE471
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_010FE48021_2_010FE480
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_010FBBD421_2_010FBBD4
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F9F5F821_2_04F9F5F8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F9978821_2_04F99788
    Source: ORDER TSA-A090621B.exe, 00000000.00000000.213493161.0000000000BB0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000005.00000000.276359549.0000000000170000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498918767.0000000006890000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498626766.00000000064F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000000.277555410.00000000010C0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.486812184.000000000180A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exeBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6af0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6af0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b6e8a4.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b6e8a4.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.79d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.79d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.3485ab4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.3485ab4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.2a49684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.2a49684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.5bb0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.5bb0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b64c9f.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b64c9f.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.495469070.000000000478F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.495497287.00000000047A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: ORDER TSA-A090621B.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.6.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@12/3
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER TSA-A090621B.exe.logJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c9622013-90b3-4810-9b2a-2fbba1723547}
    Source: ORDER TSA-A090621B.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: ORDER TSA-A090621B.exeVirustotal: Detection: 20%
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile read: C:\Users\user\Desktop\ORDER TSA-A090621B.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe 'C:\Users\user\Desktop\ORDER TSA-A090621B.exe'
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exeJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: ORDER TSA-A090621B.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: ORDER TSA-A090621B.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: ORDER TSA-A090621B.exeStatic file information: File size 1102336 > 1048576
    Source: ORDER TSA-A090621B.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10ca00
    Source: ORDER TSA-A090621B.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: ORDER TSA-A090621B.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: ORDER TSA-A090621B.exeStatic PE information: 0xD09DABD0 [Thu Nov 28 04:34:24 2080 UTC]
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 5_2_000628FD push ebp; iretd 5_2_00062AE1
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 6_2_00FB28FD push ebp; iretd 6_2_00FB2AE1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_006228FD push ebp; iretd 21_2_00622AE1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F969F8 pushad ; retf 21_2_04F969F9
    Source: initial sampleStatic PE information: section name: .text entropy: 7.62512581288
    Source: initial sampleStatic PE information: section name: .text entropy: 7.62512581288
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile opened: C:\Users\user\Desktop\ORDER TSA-A090621B.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: threadDelayed 6981Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: threadDelayed 2568Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: foregroundWindowGot 514Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: foregroundWindowGot 612Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exe TID: 5936Thread sleep time: -57864s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exe TID: 6112Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exe TID: 5032Thread sleep time: -15679732462653109s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4812Thread sleep time: -47899s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5656Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3748Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 57864Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 47899Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: ORDER TSA-A090621B.exe, dhcpmon.exeBinary or memory string: zE[TiU[]qET]m8Z\3QqeMU[]K<IgogJD|YJg4E[eyQ3[3Y5]DL6e3Q5\xDjfoUZd5<pfTU6\osp\SQ[]mopg|Y5XlY5Y843[wEjfoUZd5<pfTU6\osp\SQ[e|<pU843[wEjfoQ[YDL[]nopgyMKX3QZ]tM5W|Y5fY<YeDL[]nopgyMKX3QZ]tM5WzE[Ti4JD|YJ]s]6e|EIgmYpdl<nfoU[gz45eG<YeDPZeV]WerYHWsYZfGgmTWg4U3EzTqEqVWooe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: ORDER TSA-A090621B.exe, 00000006.00000003.323354141.00000000018C5000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Injects a PE file into a foreign processesShow sources
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeMemory written: C:\Users\user\Desktop\ORDER TSA-A090621B.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exeJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.491546202.0000000003591000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.487918215.0000000001E90000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.487918215.0000000001E90000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.491546202.0000000003591000.00000004.00000001.sdmpBinary or memory string: Program Manager8
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.487918215.0000000001E90000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmpBinary or memory string: Program Managert
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.493954778.000000000389C000.00000004.00000001.sdmpBinary or memory string: Program Manager4
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.493633744.0000000003839000.00000004.00000001.sdmpBinary or memory string: Program Manager8]F
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Users\user\Desktop\ORDER TSA-A090621B.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Users\user\Desktop\ORDER TSA-A090621B.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY

    Remote Access Functionality:

    barindex
    Detected Nanocore RatShow sources
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection112Masquerading2Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery111Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobTimestomp1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    ORDER TSA-A090621B.exe21%VirustotalBrowse
    ORDER TSA-A090621B.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe17%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack100%AviraTR/NanoCore.fadteDownload File
    21.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack100%AviraTR/NanoCore.fadteDownload File
    6.2.ORDER TSA-A090621B.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

    Domains

    SourceDetectionScannerLabelLink
    dedicatedlambo9.ddns.net7%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    dedicatedlambo9.ddns.net7%VirustotalBrowse
    dedicatedlambo9.ddns.net0%Avira URL Cloudsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.fontbureau.comdr0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
    http://www.tiro.comn0%URL Reputationsafe
    http://www.tiro.comn0%URL Reputationsafe
    http://www.tiro.comn0%URL Reputationsafe
    http://www.founder.com.cn/cnU0%Avira URL Cloudsafe
    http://www.fontbureau.comueTF0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/jp/M0%Avira URL Cloudsafe
    http://www.founder.com.cn/cnA0%Avira URL Cloudsafe
    http://www.sakkal.comx.0%Avira URL Cloudsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.sajatypeworks.comD0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/710%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/vau0%Avira URL Cloudsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.founder.com.cn/cn/0%URL Reputationsafe
    http://www.founder.com.cn/cn/0%URL Reputationsafe
    http://www.founder.com.cn/cn/0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/arge0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/Y0d0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.fontbureau.comcomF0%URL Reputationsafe
    http://www.fontbureau.comcomF0%URL Reputationsafe
    http://www.fontbureau.comcomF0%URL Reputationsafe
    http://www.fontbureau.comonyd0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/710%Avira URL Cloudsafe
    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
    http://www.fontbureau.comals0%URL Reputationsafe
    http://www.fontbureau.comals0%URL Reputationsafe
    http://www.fontbureau.comals0%URL Reputationsafe
    http://www.sakkal.comd0%Avira URL Cloudsafe
    http://www.urwpp.delar0%Avira URL Cloudsafe
    http://www.sajatypeworks.comc0%Avira URL Cloudsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.founder.com.cn/cn/s0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/ns.0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/vnoi0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    185.140.53.2530%Avira URL Cloudsafe
    http://www.founder.com.cn/cn#0%Avira URL Cloudsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    dedicatedlambo9.ddns.net
    84.38.133.182
    truetrueunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    dedicatedlambo9.ddns.nettrue
    • 7%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    185.140.53.253true
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.comORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
      high
      http://www.galapagosdesign.com/ORDER TSA-A090621B.exe, 00000000.00000003.224689665.0000000005EC3000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.fontbureau.comdrORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jiyu-kobo.co.jp/VORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.tiro.comnORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.founder.com.cn/cnUORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.comueTFORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jiyu-kobo.co.jp/jp/MORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.founder.com.cn/cnAORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.sakkal.comx.ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.tiro.comORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.sajatypeworks.comDORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jiyu-kobo.co.jp/71ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://google.comORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpfalse
        high
        http://www.jiyu-kobo.co.jp/jp/ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.fontbureau.comaORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.jiyu-kobo.co.jp/vauORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.sajatypeworks.comORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cn/ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cnORDER TSA-A090621B.exe, 00000000.00000003.219349774.000000000163D000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.jiyu-kobo.co.jp/argeORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designers/frere-jones.htmla-dORDER TSA-A090621B.exe, 00000000.00000003.223387249.0000000005EC9000.00000004.00000001.sdmpfalse
          high
          http://www.jiyu-kobo.co.jp/Y0dORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/rORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comcomFORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comonydORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmp, ORDER TSA-A090621B.exe, 00000000.00000003.221519161.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/jp/71ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comalsORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.sakkal.comdORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.urwpp.delarORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sajatypeworks.comcORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.urwpp.deORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/sORDER TSA-A090621B.exe, 00000000.00000003.219748597.0000000005EB8000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/ns.ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/vnoiORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers/cORDER TSA-A090621B.exe, 00000000.00000003.223095895.0000000005EEE000.00000004.00000001.sdmpfalse
            high
            http://www.jiyu-kobo.co.jp/_ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn#ORDER TSA-A090621B.exe, 00000000.00000003.219531458.0000000005EB7000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.founder.com.cn/cndORDER TSA-A090621B.exe, 00000000.00000003.219326151.0000000005EBE000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            84.38.133.182
            dedicatedlambo9.ddns.netLatvia
            203557DATACLUB-NLtrue
            185.140.53.253
            unknownSweden
            209623DAVID_CRAIGGGtrue

            Private

            IP
            192.168.2.1

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:451105
            Start date:20.07.2021
            Start time:08:34:07
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 12m 33s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:ORDER TSA-A090621B.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:25
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@8/8@12/3
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 39
            • Number of non-executed functions: 5
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 104.43.193.48, 52.147.198.201, 20.82.210.154, 23.211.4.86, 13.88.21.125, 40.88.32.150, 40.112.88.60, 173.222.108.210, 173.222.108.226, 80.67.82.235, 80.67.82.211
            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            08:35:27API Interceptor800x Sleep call for process: ORDER TSA-A090621B.exe modified
            08:35:33AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            08:36:14API Interceptor1x Sleep call for process: dhcpmon.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            84.38.133.182RFQ 10 UNIT.exeGet hashmaliciousBrowse
              185.140.53.253RFQ 10 UNIT.exeGet hashmaliciousBrowse
                NEWORDERrefno0992883jpg.exeGet hashmaliciousBrowse
                  CompanyLicense.exeGet hashmaliciousBrowse
                    16Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                      15Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                        58Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                          57Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                            15Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                              14Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                                57Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                                  56Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    dedicatedlambo9.ddns.netRFQ 10 UNIT.exeGet hashmaliciousBrowse
                                    • 84.38.133.182

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    DAVID_CRAIGGGRFQ 10 UNIT.exeGet hashmaliciousBrowse
                                    • 185.140.53.253
                                    A2CGhuioKe.exeGet hashmaliciousBrowse
                                    • 185.244.30.28
                                    0kEuVjiCbh.exeGet hashmaliciousBrowse
                                    • 185.244.30.28
                                    RFQ_Order WT013 - A11197322,pdf.exeGet hashmaliciousBrowse
                                    • 185.244.30.18
                                    ORDER.exeGet hashmaliciousBrowse
                                    • 185.140.53.132
                                    DHL_119040 receipt document,pdf.exeGet hashmaliciousBrowse
                                    • 185.244.30.18
                                    Img 673t5718737.exeGet hashmaliciousBrowse
                                    • 91.193.75.202
                                    Parts_Enquiry_450kr6CRT.vbsGet hashmaliciousBrowse
                                    • 185.140.53.169
                                    ltemsreceipt975432907.exeGet hashmaliciousBrowse
                                    • 185.244.30.19
                                    H194 #U5146#U57fa - Payment.exeGet hashmaliciousBrowse
                                    • 185.140.53.135
                                    Parts-Enquiry_OYU08W0VCWRDLPA.vbsGet hashmaliciousBrowse
                                    • 185.140.53.169
                                    OneDrive.exeGet hashmaliciousBrowse
                                    • 185.140.53.194
                                    CVhssiltQ9.exeGet hashmaliciousBrowse
                                    • 185.140.53.9
                                    rz89FRwKvB.exeGet hashmaliciousBrowse
                                    • 185.244.30.92
                                    doc030WA0004-55YH701-75IMG0012.exeGet hashmaliciousBrowse
                                    • 185.140.53.230
                                    Request For Quotation.xlsxGet hashmaliciousBrowse
                                    • 185.140.53.154
                                    CV CREDENTIALS.exeGet hashmaliciousBrowse
                                    • 185.140.53.8
                                    ARRIVAL NOTICEPDF.EXCL.exeGet hashmaliciousBrowse
                                    • 185.140.53.142
                                    WeASwOPOdNuVKbq.exeGet hashmaliciousBrowse
                                    • 185.140.53.8
                                    New Order# 11009947810.exeGet hashmaliciousBrowse
                                    • 185.140.53.216
                                    DATACLUB-NLRFQ 10 UNIT.exeGet hashmaliciousBrowse
                                    • 84.38.133.182
                                    FacebookSecurityUpdate.exeGet hashmaliciousBrowse
                                    • 84.38.133.101
                                    v1hBv6A71M.exeGet hashmaliciousBrowse
                                    • 84.38.133.24
                                    Standardequips_Quote.pptGet hashmaliciousBrowse
                                    • 185.29.11.15
                                    XsNgUDFxLw.exeGet hashmaliciousBrowse
                                    • 84.38.133.117
                                    18Order.exeGet hashmaliciousBrowse
                                    • 185.29.11.103
                                    56New Order oct 2018230090.exeGet hashmaliciousBrowse
                                    • 185.29.11.103

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):1102336
                                    Entropy (8bit):7.620117442134609
                                    Encrypted:false
                                    SSDEEP:24576:D0QSJpE4KrvDBbG5wOCYDr82fY+9s1q2MpSD3g:0+JG6BcICCN3
                                    MD5:F5D3B895F4109E09F8918FC52147D154
                                    SHA1:E4FE29023BD9AF1916D7C12197949DDAED424E8B
                                    SHA-256:9713A28E0645CC77089DFD921118DB8827DE0A8B7E8196D653DA2002646BD3CF
                                    SHA-512:3F3A765C18E5D2C5E39E815476B533BEFD98ADEDE73C4976A12F8B9E3BD8F5BB3B8EA995E48B4B9DEC364B82BC8C0F80E0E783C5E6DA29C293A1FDA8AEEB95C1
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 17%
                                    Reputation:low
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................P.............B.... ........@.. .......................@............@.....................................O............................ ....................................................... ............... ..H............text...H.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................$.......H...........4|..........$....L...........................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....o....('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*&..(3....*...0..<........~.....(4.....,!r...p.....(5...o6...s7............~.....
                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview: [ZoneTransfer]....ZoneId=0
                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER TSA-A090621B.exe.log
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1314
                                    Entropy (8bit):5.350128552078965
                                    Encrypted:false
                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1314
                                    Entropy (8bit):5.350128552078965
                                    Encrypted:false
                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1624
                                    Entropy (8bit):7.024371743172393
                                    Encrypted:false
                                    SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC08
                                    MD5:0D79388CEC6619D612C2088173BB6741
                                    SHA1:8A312E3198009C545D0CF3254572189D29A03EA7
                                    SHA-256:D7D423B23D932E306F3CCB2F7A984B7036A042C007A43FD655C6B57B960BB8DF
                                    SHA-512:53BB3E9263DFD746E7E8159466E220E6EC9D81E9D3F0E1D191E09CD511B7EB93B0BA65D13CE0C97C652ECD0F69BB991E6B1840F961BC65003C4DD7AA93EEDA13
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8
                                    Entropy (8bit):3.0
                                    Encrypted:false
                                    SSDEEP:3:7ht:tt
                                    MD5:A7550BD6998D4B201226569FAD19FEE2
                                    SHA1:9B40BDC466BCB9BD006D37E5704C428A8EA6AC7D
                                    SHA-256:C484DF23E31180678D28C7C68F6DAA4F721849C74613C19EEB9920CDBF544466
                                    SHA-512:8622EDACFC4BD5C90BD976BB008FBC142E6B6CE6326B5C27BA8D86E22527F6F055D91DC1BD67E094A3EF9951D7920B0DE600F0210A50342D1ED3D5F01288EA9C
                                    Malicious:true
                                    Preview: .s...K.H
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):40
                                    Entropy (8bit):5.153055907333276
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                    MD5:4E5E92E2369688041CC82EF9650EDED2
                                    SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                    SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                    SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                    Malicious:false
                                    Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):327432
                                    Entropy (8bit):7.99938831605763
                                    Encrypted:true
                                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                    Malicious:false
                                    Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.620117442134609
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:ORDER TSA-A090621B.exe
                                    File size:1102336
                                    MD5:f5d3b895f4109e09f8918fc52147d154
                                    SHA1:e4fe29023bd9af1916d7c12197949ddaed424e8b
                                    SHA256:9713a28e0645cc77089dfd921118db8827de0a8b7e8196d653da2002646bd3cf
                                    SHA512:3f3a765c18e5d2c5e39e815476b533befd98adede73c4976a12f8b9e3bd8f5bb3b8ea995e48b4b9dec364b82bc8c0f80e0e783c5e6da29c293a1fda8aeeb95c1
                                    SSDEEP:24576:D0QSJpE4KrvDBbG5wOCYDr82fY+9s1q2MpSD3g:0+JG6BcICCN3
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.............B.... ........@.. .......................@............@................................

                                    File Icon

                                    Icon Hash:00828e8e8686b000

                                    Static PE Info

                                    General

                                    Entrypoint:0x50e942
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0xD09DABD0 [Thu Nov 28 04:34:24 2080 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                    Entrypoint Preview

                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x10e8f00x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1100000x3a8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1120000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x10e8d40x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x10c9480x10ca00False0.77032467863data7.62512581288IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0x1100000x3a80x400False0.3740234375data2.91950610469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1120000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0x1100580x34cdata

                                    Imports

                                    DLLImport
                                    mscoree.dll_CorExeMain

                                    Version Infos

                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyrightCopyright 2019
                                    Assembly Version1.0.0.0
                                    InternalNameConstructorIn.exe
                                    FileVersion1.0.0.0
                                    CompanyName
                                    LegalTrademarks
                                    Comments
                                    ProductNameControlVehicular
                                    ProductVersion1.0.0.0
                                    FileDescriptionControlVehicular
                                    OriginalFilenameConstructorIn.exe

                                    Network Behavior

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 20, 2021 08:35:34.780050993 CEST497251604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:34.832556009 CEST160449725185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:35.437164068 CEST497251604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:35.493923903 CEST160449725185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:36.137645960 CEST497251604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:36.190048933 CEST160449725185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:40.514049053 CEST497281604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:40.567167044 CEST160449728185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:41.075562000 CEST497281604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:41.128336906 CEST160449728185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:41.638111115 CEST497281604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:41.690731049 CEST160449728185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:45.704961061 CEST497291604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:45.757949114 CEST160449729185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:46.263520002 CEST497291604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:46.316087008 CEST160449729185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:46.826009035 CEST497291604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:46.878325939 CEST160449729185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:51.594572067 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.643904924 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:51.644035101 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.744390965 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.808680058 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:51.825025082 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.874622107 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:51.898194075 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.968378067 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014534950 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014588118 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014627934 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014659882 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.014666080 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014740944 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.063858032 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.063915968 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.063956022 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.063993931 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064040899 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064059019 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.064074993 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064105034 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064133883 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064166069 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.064202070 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.113691092 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113795996 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113843918 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113882065 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113919973 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113931894 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.113956928 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.113957882 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113996029 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114016056 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114032984 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114079952 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114123106 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114135027 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114161968 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114164114 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114198923 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114237070 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114265919 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114295959 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114304066 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114331961 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114341021 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.115328074 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164592981 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164619923 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164653063 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164669037 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164690971 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164748907 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164767027 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164793968 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164817095 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164850950 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164866924 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164895058 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164968967 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165030956 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165081024 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165107012 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165136099 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165177107 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165203094 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165215015 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165255070 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165292978 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165313005 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165338039 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165342093 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165385008 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165422916 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165462017 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165465117 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165501118 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165535927 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165539026 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165577888 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165616035 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165616035 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165664911 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165708065 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165719986 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165745974 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165760040 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165785074 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165824890 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165851116 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165863037 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165903091 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165927887 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165941954 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.166249990 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.216780901 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.216841936 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.216881990 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.216918945 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.216958046 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.216984987 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.217042923 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.217689991 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.217734098 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.217755079 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.217772007 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.217809916 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.217847109 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.217860937 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.217895031 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.217897892 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.217937946 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.217978954 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218019009 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218030930 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218055964 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218085051 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218113899 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218142986 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218173027 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218189955 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218213081 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218218088 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218250990 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218261957 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218287945 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218334913 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218375921 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218388081 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218413115 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218427896 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218452930 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218491077 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218527079 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218544006 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218564987 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218580008 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218602896 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218648911 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218691111 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218697071 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218728065 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218739986 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218765974 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218803883 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218839884 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218852997 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218878031 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218893051 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.218915939 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.218964100 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219007969 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219027042 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.219046116 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219064951 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.219084978 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219150066 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219192028 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219208002 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.219229937 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219244957 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.219266891 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219304085 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219351053 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.219355106 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.219405890 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.266622066 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.266683102 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.266722918 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.266761065 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.266762018 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.266799927 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.266813040 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.269438982 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269484043 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269524097 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269563913 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269565105 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.269582033 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.269603014 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269649029 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269694090 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269705057 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.269732952 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269747972 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.269771099 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269809008 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269845963 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.269848108 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269887924 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269897938 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.269926071 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269957066 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.269985914 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270015001 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270051956 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270055056 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270090103 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270123959 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270129919 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270170927 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270194054 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270220995 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270266056 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270304918 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270318031 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270344019 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270359993 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270380974 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270418882 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270457983 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270476103 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270495892 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270514965 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270543098 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270586014 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270623922 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270639896 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270663977 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270678043 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270701885 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270740032 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270778894 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270801067 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270819902 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270840883 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270868063 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270910978 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270950079 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.270983934 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.270988941 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.271017075 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.271028996 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.271069050 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.271101952 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.271111012 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.271246910 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.316195965 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.316245079 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.316282034 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.316313028 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.316364050 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.320528984 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320681095 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320697069 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320714951 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320732117 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320749044 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320765018 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320780993 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320797920 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320810080 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320827007 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320843935 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320856094 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320864916 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.320868015 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320882082 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320893049 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320897102 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.320904970 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320923090 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.320935965 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320952892 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320952892 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.320972919 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320982933 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.320986032 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.320997953 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321010113 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321011066 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321022034 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321059942 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321084023 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321090937 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321109056 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321120977 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321155071 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321165085 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321182966 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321194887 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321206093 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321221113 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321223974 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321237087 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321248055 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321249962 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321265936 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321279049 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321283102 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321305037 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321311951 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321321964 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321333885 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321338892 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321346045 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321357965 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321367979 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321372986 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321391106 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321403027 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.321407080 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321439981 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.321465015 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.366014957 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366044044 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366063118 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366080046 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366096020 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366106033 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.366107941 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366123915 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366126060 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.366141081 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.366158962 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.366183996 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.371457100 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371476889 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371535063 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371556044 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371577024 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.371581078 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371606112 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371618032 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371629953 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371635914 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.371642113 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371653080 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371715069 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.371727943 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371757030 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371782064 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371802092 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371803999 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.371814966 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371826887 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371839046 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371850014 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371864080 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371897936 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371906042 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.371922016 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371947050 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371948004 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.371964931 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.371982098 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372000933 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372014999 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372030973 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372046947 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372056961 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372066975 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372090101 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372112036 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372117996 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372140884 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372159004 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372169018 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372180939 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372205019 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372217894 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372226000 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372245073 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372248888 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372268915 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372272968 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372292995 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372311115 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372318029 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372330904 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372356892 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372358084 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372378111 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372400999 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372417927 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372419119 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372437954 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372452974 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372463942 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372476101 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372487068 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372504950 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372522116 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372529030 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372540951 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372560024 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372575998 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372580051 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372587919 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.372616053 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.372639894 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.406354904 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.476989031 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:53.453222990 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:53.526494026 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:54.432128906 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:59.616671085 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:59.666424036 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:59.666547060 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:59.674715042 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:59.745923996 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:59.748042107 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:59.748449087 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:59.799794912 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:59.801280022 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:59.873811960 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:59.995476961 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:00.045862913 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.098617077 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:00.139633894 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.153841972 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.223372936 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:00.225408077 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.280018091 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:00.327168941 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.378777027 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:00.429416895 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.483350992 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.565212011 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:00.565306902 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.645528078 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:00.647186041 CEST16044973684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:00.648022890 CEST497361604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:04.882488966 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:04.932894945 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:04.933034897 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:04.968286037 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.037817001 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.050530910 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.050919056 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.100234985 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.116175890 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.185770035 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.309700012 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.358791113 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.364695072 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.411319017 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.434937954 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.435060978 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.484843016 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.530883074 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.583941936 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.641324043 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.666393995 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.747742891 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:05.857614994 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:05.937856913 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:06.624069929 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:06.706425905 CEST16044974284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:07.610399008 CEST497421604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:11.827730894 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:11.877908945 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:11.878081083 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:11.878678083 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:11.942775965 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:12.000010967 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:12.119510889 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:12.169223070 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:12.170948982 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:12.242774010 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:12.354728937 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:12.421961069 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:12.471067905 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:12.515708923 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:13.069634914 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:13.142565012 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:13.213212967 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:13.291481972 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:13.409466982 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:13.460418940 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:13.474956989 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:13.524838924 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:13.595284939 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:13.678317070 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:14.235063076 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:14.316437006 CEST16044974384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:15.251420975 CEST497431604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.365802050 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.415199041 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.416326046 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.417577982 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.479557037 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.483127117 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.484251022 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.534780979 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.537146091 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.599715948 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.729376078 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.778846025 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.829233885 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.875644922 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.881397963 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.934151888 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:19.934909105 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:19.986805916 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:20.031929016 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:20.345616102 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:20.423079014 CEST16044974484.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:21.360987902 CEST497441604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:25.575212002 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:25.627619982 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:25.627723932 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:25.628452063 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:25.691920996 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:25.692967892 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:25.742631912 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:25.744246960 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:25.812422037 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:25.936589003 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:25.937601089 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:25.987081051 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:25.989042044 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:26.039273024 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:26.039436102 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:26.088931084 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:26.141769886 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:26.392842054 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:26.465935946 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:26.869774103 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:26.923799992 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:27.408922911 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:27.494287968 CEST16044974584.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:28.393049955 CEST497451604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:32.517689943 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:32.567862034 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:32.568007946 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:32.572086096 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:32.641602039 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:32.641868114 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:32.691443920 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:32.693396091 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:32.763067007 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:32.873828888 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:32.874705076 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:32.934751034 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:32.937912941 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:33.003925085 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:33.004929066 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:33.063951969 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:33.120979071 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:33.485510111 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:33.562691927 CEST16044974684.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:34.455689907 CEST497461604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:38.568850994 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:38.619884968 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:38.620060921 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:38.620976925 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:38.691765070 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:38.696271896 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:38.726843119 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:38.777383089 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:38.779190063 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:38.851067066 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:38.965924025 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:38.966922998 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:39.017501116 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:39.020013094 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:39.071439028 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:39.071533918 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:39.121520042 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:39.121690989 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:39.196410894 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:39.440747976 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:39.509864092 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:40.441020966 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:40.512226105 CEST16044974984.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:41.456718922 CEST497491604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:45.626446009 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:45.675822973 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:45.675966024 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:45.676815033 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:45.748863935 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:45.749296904 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:45.799792051 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:45.801448107 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:45.877775908 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:45.995266914 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:45.996284008 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:46.045897961 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:46.047257900 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:46.097230911 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:46.097943068 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:46.148561954 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:46.190368891 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:46.526102066 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:46.596079111 CEST16044975084.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:47.503654957 CEST497501604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:51.634320974 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:51.685692072 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:51.685846090 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:51.686499119 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:51.753999949 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:51.754295111 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:51.809056044 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:51.810956955 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:51.888804913 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:52.013464928 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:52.015007973 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:52.067373991 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:52.069416046 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:52.120511055 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:52.123348951 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:52.178476095 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:52.222131014 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:52.276515961 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:52.347429037 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:52.513855934 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:52.589907885 CEST16044975184.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:53.504070044 CEST497511604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:57.747488022 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:57.796648979 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:57.796802044 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:57.797463894 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:57.864881992 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:57.865355015 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:57.914978981 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:57.916517973 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:57.987215996 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:58.106487989 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:58.139183044 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:58.189172983 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:58.210777044 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:58.259957075 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:58.260086060 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:58.310583115 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:58.328128099 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:58.399395943 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:58.489037991 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:58.556963921 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:58.954291105 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:36:59.007534027 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:59.520733118 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:36:59.601670027 CEST16044975284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:00.505800962 CEST497521604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:04.618011951 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:04.668307066 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:04.668401957 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:04.668889999 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:04.732893944 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:04.733206987 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:04.784250021 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:04.786379099 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:04.856143951 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:04.981331110 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:04.982409954 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:05.032196045 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:05.036786079 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:05.086585045 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:05.086743116 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:05.136151075 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:05.191977024 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:05.614636898 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:05.683141947 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:06.898926973 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:06.942146063 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:09.719638109 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:09.771914005 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:14.720722914 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:14.770965099 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:14.905548096 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:14.958498001 CEST497531604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:37:19.749526024 CEST16044975384.38.133.182192.168.2.3
                                    Jul 20, 2021 08:37:19.804795980 CEST497531604192.168.2.384.38.133.182

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 20, 2021 08:34:53.545691967 CEST6015253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:53.603352070 CEST53601528.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:54.573818922 CEST5754453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:54.640820980 CEST53575448.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:55.424590111 CEST5598453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:55.476885080 CEST53559848.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:56.579981089 CEST6418553192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:56.641343117 CEST53641858.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:57.780179024 CEST6511053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:57.829746962 CEST53651108.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:59.329930067 CEST5836153192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:59.382251978 CEST53583618.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:03.831197023 CEST6349253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:03.888165951 CEST53634928.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:23.516596079 CEST6083153192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:23.590126038 CEST53608318.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:24.242350101 CEST6010053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:24.300898075 CEST53601008.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:25.059842110 CEST5319553192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:25.112210989 CEST53531958.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:26.223959923 CEST5014153192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:26.280510902 CEST53501418.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:27.387494087 CEST5302353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:27.447293997 CEST53530238.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:28.302690029 CEST4956353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:28.364147902 CEST53495638.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:29.511519909 CEST5135253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:29.574074030 CEST53513528.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:31.369796038 CEST5934953192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:31.419261932 CEST53593498.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:32.711429119 CEST5708453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:32.768209934 CEST53570848.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:36.647136927 CEST5882353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:36.704849958 CEST53588238.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:37.812659025 CEST5756853192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:37.872311115 CEST53575688.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:46.183872938 CEST5054053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:46.253024101 CEST53505408.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:46.374830008 CEST5436653192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:46.433748007 CEST53543668.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:51.531042099 CEST5303453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:51.592425108 CEST53530348.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:58.652704954 CEST5776253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:58.726581097 CEST53577628.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:59.546921968 CEST5543553192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:59.605354071 CEST53554358.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:03.621918917 CEST5071353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:03.683888912 CEST53507138.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:04.778085947 CEST5613253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:04.838644981 CEST53561328.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:11.737570047 CEST5898753192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:11.796391010 CEST53589878.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:19.305597067 CEST5657953192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:19.363178015 CEST53565798.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:25.514846087 CEST6063353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:25.573158979 CEST53606338.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:32.455975056 CEST6129253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:32.516514063 CEST53612928.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:34.155363083 CEST6361953192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:34.215497017 CEST53636198.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:36.368540049 CEST6493853192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:36.425828934 CEST53649388.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:38.505142927 CEST6194653192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:38.567308903 CEST53619468.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:45.567162037 CEST6491053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:45.625282049 CEST53649108.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:51.571012974 CEST5212353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:51.632529020 CEST53521238.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:57.688997030 CEST5613053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:57.746087074 CEST53561308.8.8.8192.168.2.3
                                    Jul 20, 2021 08:37:04.547127008 CEST5633853192.168.2.38.8.8.8
                                    Jul 20, 2021 08:37:04.605415106 CEST53563388.8.8.8192.168.2.3

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Jul 20, 2021 08:35:51.531042099 CEST192.168.2.38.8.8.80x461bStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:35:59.546921968 CEST192.168.2.38.8.8.80xa3c3Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:04.778085947 CEST192.168.2.38.8.8.80xdff9Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:11.737570047 CEST192.168.2.38.8.8.80x88a6Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:19.305597067 CEST192.168.2.38.8.8.80x711bStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:25.514846087 CEST192.168.2.38.8.8.80x676fStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:32.455975056 CEST192.168.2.38.8.8.80x237bStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:38.505142927 CEST192.168.2.38.8.8.80xcdcfStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:45.567162037 CEST192.168.2.38.8.8.80xa1e0Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:51.571012974 CEST192.168.2.38.8.8.80xf34cStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:57.688997030 CEST192.168.2.38.8.8.80xd032Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:37:04.547127008 CEST192.168.2.38.8.8.80xb17Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Jul 20, 2021 08:35:51.592425108 CEST8.8.8.8192.168.2.30x461bNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:35:59.605354071 CEST8.8.8.8192.168.2.30xa3c3No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:04.838644981 CEST8.8.8.8192.168.2.30xdff9No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:11.796391010 CEST8.8.8.8192.168.2.30x88a6No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:19.363178015 CEST8.8.8.8192.168.2.30x711bNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:25.573158979 CEST8.8.8.8192.168.2.30x676fNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:32.516514063 CEST8.8.8.8192.168.2.30x237bNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:38.567308903 CEST8.8.8.8192.168.2.30xcdcfNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:45.625282049 CEST8.8.8.8192.168.2.30xa1e0No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:51.632529020 CEST8.8.8.8192.168.2.30xf34cNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:57.746087074 CEST8.8.8.8192.168.2.30xd032No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:37:04.605415106 CEST8.8.8.8192.168.2.30xb17No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)

                                    Code Manipulations

                                    Statistics

                                    CPU Usage

                                    Click to jump to process

                                    Memory Usage

                                    Click to jump to process

                                    High Level Behavior Distribution

                                    Click to dive into process behavior distribution

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:08:34:59
                                    Start date:20/07/2021
                                    Path:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\ORDER TSA-A090621B.exe'
                                    Imagebase:0xaa0000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    General

                                    Start time:08:35:28
                                    Start date:20/07/2021
                                    Path:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Imagebase:0x60000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    General

                                    Start time:08:35:29
                                    Start date:20/07/2021
                                    Path:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Imagebase:0xfb0000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.495469070.000000000478F000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.495497287.00000000047A6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, Author: Florian Roth
                                    Reputation:low

                                    General

                                    Start time:08:35:42
                                    Start date:20/07/2021
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                    Imagebase:0xcf0000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 17%, ReversingLabs
                                    Reputation:low

                                    General

                                    Start time:08:36:15
                                    Start date:20/07/2021
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0x620000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    Reputation:low

                                    Disassembly

                                    Code Analysis

                                    Reset < >

                                      Executed Functions

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 017CB730
                                      • GetCurrentThread.KERNEL32 ref: 017CB76D
                                      • GetCurrentProcess.KERNEL32 ref: 017CB7AA
                                      • GetCurrentThreadId.KERNEL32 ref: 017CB803
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: b8627ba9857fbfff734e83e5fcd6403115f407e92b12d788baa4c1dd99954e7d
                                      • Instruction ID: 0b547b0779d55c61a173af5aace71dd569ee9521663e8b4a9a46c3d452391110
                                      • Opcode Fuzzy Hash: b8627ba9857fbfff734e83e5fcd6403115f407e92b12d788baa4c1dd99954e7d
                                      • Instruction Fuzzy Hash: 775154B09042088FDB14CFAAD549BAEFBF1EB48314F24846EE419A7360C7749944CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 152f615da9d2039a49f0ebf7d51fb9c4a80db09bed42c2126093fd9d0605d5aa
                                      • Instruction ID: 67997845a3116f3b5f11a31c6af0a030276e57e024d18f1c110e10378b4de849
                                      • Opcode Fuzzy Hash: 152f615da9d2039a49f0ebf7d51fb9c4a80db09bed42c2126093fd9d0605d5aa
                                      • Instruction Fuzzy Hash: 64713270A00B058FD764DF2AD44475BFBF5BB88718F008A6DE68ADBA40DB34E905CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 017CFD0A
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: f840ffdf6cee2d378965067e159190a12ce83d00a7dbdfeb644ebca7dbab2f9f
                                      • Instruction ID: 0df497af044847b332abca78f65eb4af421a491463edab77e8df9a438fc97a4f
                                      • Opcode Fuzzy Hash: f840ffdf6cee2d378965067e159190a12ce83d00a7dbdfeb644ebca7dbab2f9f
                                      • Instruction Fuzzy Hash: 8341A0B1D002099FDB14CF99D884ADEFBB5FF48714F24812EE819AB250D7749985CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017CBD87
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 4bf81aa6942b7427fb0e9b400b4748e62a763c6a859252093ded1f5300ffc393
                                      • Instruction ID: 2b5752e7b7a836757c61b02f1a18ae18b03cd71c88bc99ce8985b49828915449
                                      • Opcode Fuzzy Hash: 4bf81aa6942b7427fb0e9b400b4748e62a763c6a859252093ded1f5300ffc393
                                      • Instruction Fuzzy Hash: 6A21C4B59002089FDB10DFAAD984ADEFFF8EB48324F14841AE954A7350D374A954CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNEL32(00000000,?,?), ref: 017C98BA
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 33a9715f81721b4d64a86b7641b4eab5f4f03c9bfb6b644315205180925a212e
                                      • Instruction ID: eedbbfe96afbd6fca3598544de0e37f1cde6c1ab0574d59938ceeb15e9014370
                                      • Opcode Fuzzy Hash: 33a9715f81721b4d64a86b7641b4eab5f4f03c9bfb6b644315205180925a212e
                                      • Instruction Fuzzy Hash: 9B11D0B69002098FDB10DFAAD844ADEFBF4EB88724F15842EE519A7600C375A545CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,?,017C93FB), ref: 017C962E
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: ae8ae673f45abf0b157c0854ee0f9c68691687700241e774126b0beeab67098b
                                      • Instruction ID: 75fb62e3f0a74eb0d731b0a534abf395bf132f5384d4dfb604f613cff88ad5a0
                                      • Opcode Fuzzy Hash: ae8ae673f45abf0b157c0854ee0f9c68691687700241e774126b0beeab67098b
                                      • Instruction Fuzzy Hash: 7811F0B58006098BDB20DF9AD444BDEFBF4EB88728F10846ED559B7640C374A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetWindowLongW.USER32(?,?,?), ref: 017CFE9D
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID:
                                      • API String ID: 1378638983-0
                                      • Opcode ID: 3b89a99dd20d03906c397723cc1488727881ef34b1d50bf9678b58be7bc406bc
                                      • Instruction ID: 2d41f22604afb114604ea6899a5fba42e401911f1c58e56eb13b9a2fc7c6d146
                                      • Opcode Fuzzy Hash: 3b89a99dd20d03906c397723cc1488727881ef34b1d50bf9678b58be7bc406bc
                                      • Instruction Fuzzy Hash: 9F1115B58002088FDB10DF9AD584BDEFBF8EB48724F10841AE915B7340C374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Non-executed Functions

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a6587857a75b68c031ab080263ebbd7b4c36453492f16e198ff94a34eeb2db5a
                                      • Instruction ID: f1655d19566a2097eff75392e32a88534f06373a3277c4486d24c707d1b3132c
                                      • Opcode Fuzzy Hash: a6587857a75b68c031ab080263ebbd7b4c36453492f16e198ff94a34eeb2db5a
                                      • Instruction Fuzzy Hash: D91291F18157468BE730DF65E8981893FB1B745338B90C209D2622FAE9D7F8164ACF84
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.486470299.00000000017C0000.00000040.00000001.sdmp, Offset: 017C0000, based on PE: false
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: df45a8c40a1bfc4d009c1d429f4aa01947b72c6b8332d1ecb8836e92313df6d6
                                      • Instruction ID: 5ee4cf3710b3979b6d525ac9b93c926be28c98eb0b6c6a1f22bab7c5b8d7f47d
                                      • Opcode Fuzzy Hash: df45a8c40a1bfc4d009c1d429f4aa01947b72c6b8332d1ecb8836e92313df6d6
                                      • Instruction Fuzzy Hash: D2C1FAB18117468BE720DF65E8881897FB1BB85338F51C309D2616FAD8D7F8264ACF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Executed Functions

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 010FB730
                                      • GetCurrentThread.KERNEL32 ref: 010FB76D
                                      • GetCurrentProcess.KERNEL32 ref: 010FB7AA
                                      • GetCurrentThreadId.KERNEL32 ref: 010FB803
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID: X$zBf7
                                      • API String ID: 2063062207-3521624849
                                      • Opcode ID: 6bd9b664653c83162da8cdc5f77b7233a2f898c569c5f6a9b9e7b328d95d65a3
                                      • Instruction ID: 68690d82bac617cfc2710f90376b2dc7232a0e50dd58cc11b9aac4e4d797c11f
                                      • Opcode Fuzzy Hash: 6bd9b664653c83162da8cdc5f77b7233a2f898c569c5f6a9b9e7b328d95d65a3
                                      • Instruction Fuzzy Hash: D15153B49002488FDB28DFAAD588BDEBBF0AF48314F248469E159A7B51D7349885CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 010FB730
                                      • GetCurrentThread.KERNEL32 ref: 010FB76D
                                      • GetCurrentProcess.KERNEL32 ref: 010FB7AA
                                      • GetCurrentThreadId.KERNEL32 ref: 010FB803
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID: X$zBf7
                                      • API String ID: 2063062207-3521624849
                                      • Opcode ID: 2de3a1496a9de74f6ca18670e75a0bdbe823e208028efa7c00fcb77102ca4e5f
                                      • Instruction ID: 1bd696328e0218a2f9389338862a076de8175fba0d78d0c07c27bbbc17b24ff8
                                      • Opcode Fuzzy Hash: 2de3a1496a9de74f6ca18670e75a0bdbe823e208028efa7c00fcb77102ca4e5f
                                      • Instruction Fuzzy Hash: 955144B09002088FDB28DFAAD548BEEBBF1BF48314F248459E119B7750D774A885CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010FFD0A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID: zBf7$zBf7
                                      • API String ID: 716092398-3521261315
                                      • Opcode ID: d3af64e9e81c2b71747384744050ec78ec1dbc5db98de71a4fe5e7f76877d2c4
                                      • Instruction ID: 8343127d6fee937f3e974572ec6af2609fb3ecd2e01cded8027e79af8900e764
                                      • Opcode Fuzzy Hash: d3af64e9e81c2b71747384744050ec78ec1dbc5db98de71a4fe5e7f76877d2c4
                                      • Instruction Fuzzy Hash: 9151DFB1D002099FDB14DFA9D884ADEBBB5FF48314F24812AE919AB210D774A945CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010FFD0A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID: zBf7$zBf7
                                      • API String ID: 716092398-3521261315
                                      • Opcode ID: fecaf4a429cf741b76496ea07bf3d18f5fc77c180b6e75b65132bf5bb5aceaca
                                      • Instruction ID: 42ef1e4f65a8c2f67d145255ce31af29375d2c6b1cf58b011d41620765eae44f
                                      • Opcode Fuzzy Hash: fecaf4a429cf741b76496ea07bf3d18f5fc77c180b6e75b65132bf5bb5aceaca
                                      • Instruction Fuzzy Hash: 3541C0B1D00309DFDB14DF99D884ADEBFB5BF48314F24812AE919AB250D7749945CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID:
                                      • String ID: zBf7
                                      • API String ID: 0-3720523620
                                      • Opcode ID: bcea94bc6d5a25b2b2612051cefec1160913b7700c9df10efbad085bd2cc5020
                                      • Instruction ID: 907718de17e400a0079e57fd85f714ae6c9c392b98ef949036c346daa81b3725
                                      • Opcode Fuzzy Hash: bcea94bc6d5a25b2b2612051cefec1160913b7700c9df10efbad085bd2cc5020
                                      • Instruction Fuzzy Hash: 3F225E74E00106DBFF18DF98D584AAEB7F2EB89310F2589A5D41167264D734BC82CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 010F962E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID: zBf7
                                      • API String ID: 4139908857-3720523620
                                      • Opcode ID: e7dd7b58a77fcb4e0d1bfd956379d1e7d2b6796d91aa3af3fa58565e6f36a7ed
                                      • Instruction ID: 95ffb9238af6c5fb80429ec6d037ed4cd010b03ebfd35426faff44f7b0c1115f
                                      • Opcode Fuzzy Hash: e7dd7b58a77fcb4e0d1bfd956379d1e7d2b6796d91aa3af3fa58565e6f36a7ed
                                      • Instruction Fuzzy Hash: A7713570A00B058FDB64DF29D04579ABBF1BF88218F008A6EE686D7B40DB34E845CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 04F946B1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: Create
                                      • String ID: zBf7
                                      • API String ID: 2289755597-3720523620
                                      • Opcode ID: 5055779f243e20621f61fe955c5fd0ce241177a59d057cc332f5d3c8d3d7ce2e
                                      • Instruction ID: bf5edd2e0f65098f299d95d313b15291773afa83e9aa27dde809804d1493b93d
                                      • Opcode Fuzzy Hash: 5055779f243e20621f61fe955c5fd0ce241177a59d057cc332f5d3c8d3d7ce2e
                                      • Instruction Fuzzy Hash: A041E3B1C04258CFEB24DFA5C8847DDBBF1BF99308F208069D409AB251DB756946CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 04F946B1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: Create
                                      • String ID: zBf7
                                      • API String ID: 2289755597-3720523620
                                      • Opcode ID: 126058e3a4b14f237f4ba98a358e194c36fe9a36f7fb331e3e93b2f835db5fe1
                                      • Instruction ID: 77917ce5159047c72c29039d71499c054e5058a652f6987549e77130cb414237
                                      • Opcode Fuzzy Hash: 126058e3a4b14f237f4ba98a358e194c36fe9a36f7fb331e3e93b2f835db5fe1
                                      • Instruction Fuzzy Hash: 8A41F3B1D0421CCBEB24DFA9C84479DBBF5BF89308F208059D409BB251DB75A946CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04F92531
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: CallProcWindow
                                      • String ID: zBf7
                                      • API String ID: 2714655100-3720523620
                                      • Opcode ID: 6e10544c2eef7bd12a97bd93644f15d80e438684cc752a4e1331e2953e750a90
                                      • Instruction ID: 0e81e51743b4a4cc4a9f42c5ce22a408816ac7f04626667c24ff1aec67dee80f
                                      • Opcode Fuzzy Hash: 6e10544c2eef7bd12a97bd93644f15d80e438684cc752a4e1331e2953e750a90
                                      • Instruction Fuzzy Hash: D54129B5A00205DFDB14CF99C488AAABBF5FF88314F25C899D519AB321D734E841CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: CreateFromIconResource
                                      • String ID: zBf7
                                      • API String ID: 3668623891-3720523620
                                      • Opcode ID: fc51ff4f02ce2a551b913606f948e80b629828a9592ed1adeb75fbb9e2124e9d
                                      • Instruction ID: ded9561a5b779ed5235da65aac1dc9909ecd123b9224d424b6b311b4a916fd6d
                                      • Opcode Fuzzy Hash: fc51ff4f02ce2a551b913606f948e80b629828a9592ed1adeb75fbb9e2124e9d
                                      • Instruction Fuzzy Hash: 38318971904248DFDF11DFA9D804AEABFF8EF49224F04805AF954A7221C335A855DFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010FBD87
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID: zBf7
                                      • API String ID: 3793708945-3720523620
                                      • Opcode ID: e3ce7a800d713613cc28b89d2090ef94548de4165209b2354de85a782de04aa9
                                      • Instruction ID: 4fdfd87b0fcafff52575c7010e28dcc83b5734863c71fbff767124eb8a2a344d
                                      • Opcode Fuzzy Hash: e3ce7a800d713613cc28b89d2090ef94548de4165209b2354de85a782de04aa9
                                      • Instruction Fuzzy Hash: AA21E4B5900208EFDB10DFAAD484ADEFFF4EB48324F14841AE958A7350D378A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010FBD87
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID: zBf7
                                      • API String ID: 3793708945-3720523620
                                      • Opcode ID: 8ac227a88f11395eca04ff503be134ab68890a70aeefc26e5c2ed1aa30e6ec36
                                      • Instruction ID: 83bdc56e709b29935c82a36fbae62d79de6a2bff317363e0d0526f8676f58cd9
                                      • Opcode Fuzzy Hash: 8ac227a88f11395eca04ff503be134ab68890a70aeefc26e5c2ed1aa30e6ec36
                                      • Instruction Fuzzy Hash: 2121C4B5900208DFDB10DFAAD984ADEFFF8EB48324F14841AE954A3350D374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010F96A9,00000800,00000000,00000000), ref: 010F98BA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: zBf7
                                      • API String ID: 1029625771-3720523620
                                      • Opcode ID: a2002c727addfe52330fdda06f5dd74ce15eb360ce8514e5b17fb40469fc0714
                                      • Instruction ID: 362e5fcfb78e2b71e108cd4c9e903fa4c66c86677492a99052e8de57afb6bd01
                                      • Opcode Fuzzy Hash: a2002c727addfe52330fdda06f5dd74ce15eb360ce8514e5b17fb40469fc0714
                                      • Instruction Fuzzy Hash: B71103B68002099FDB10DFAAD444BDEFBF4EB88324F14842EE555A7600C374A546CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,04F9B8B2,?,?,?,?,?), ref: 04F9B957
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: CreateFromIconResource
                                      • String ID: zBf7
                                      • API String ID: 3668623891-3720523620
                                      • Opcode ID: a8075b7d2a8bfecbddc4b7a3e74f64bf82b652eb6096c4cb9b2c2ecbf749cb8e
                                      • Instruction ID: f469cb1a3f9da0b44d5dc5d4f2e887fff7a6af48386aa49fa29415e7747c33a6
                                      • Opcode Fuzzy Hash: a8075b7d2a8bfecbddc4b7a3e74f64bf82b652eb6096c4cb9b2c2ecbf749cb8e
                                      • Instruction Fuzzy Hash: 701144B1800249DFDB10DFAAD844BEEBFF8EB48324F14841AE914B3210C375A955DFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010F96A9,00000800,00000000,00000000), ref: 010F98BA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: zBf7
                                      • API String ID: 1029625771-3720523620
                                      • Opcode ID: 94f95b2e0cf3e8f4a8175316b451ed822d5b96e68a8915796eba1facb8489869
                                      • Instruction ID: ff7f682fb058ee29bc1af9f3d8f23e40d9bce6d2503d4c39528b61cd77493959
                                      • Opcode Fuzzy Hash: 94f95b2e0cf3e8f4a8175316b451ed822d5b96e68a8915796eba1facb8489869
                                      • Instruction Fuzzy Hash: B11122B6900208CBDB10CF9AC444BAEFBF4EB88324F14842EE555A7600C374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,010453E8,00000000,?), ref: 04F9E73D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID: zBf7
                                      • API String ID: 410705778-3720523620
                                      • Opcode ID: cc002b5634cab71b507a657a35935ce73abec9aa4e26d4b166da087627fba415
                                      • Instruction ID: 717ee99ef54765c39f900d40fdb0a55cc20c3d5d8564021f93084672fd1e048f
                                      • Opcode Fuzzy Hash: cc002b5634cab71b507a657a35935ce73abec9aa4e26d4b166da087627fba415
                                      • Instruction Fuzzy Hash: 2A1128B5900309DFDB10DF9AC845BEEBBF8FB48324F10841AE554A3641D374A945CFA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,010453E8,00000000,?), ref: 04F9E73D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID: zBf7
                                      • API String ID: 410705778-3720523620
                                      • Opcode ID: 4affa6920a568b2e6ce13335d7ba9487f69a289c8446dad3b5412e9583b238c6
                                      • Instruction ID: 58bdb662ab730ee377708fd582a7a0ca7fe015885590daffd841b2312a017f74
                                      • Opcode Fuzzy Hash: 4affa6920a568b2e6ce13335d7ba9487f69a289c8446dad3b5412e9583b238c6
                                      • Instruction Fuzzy Hash: D71158B58003499FDB10CF9AD884BEEBFF8FB48324F108419E454A3241C378AA45CFA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetWindowLongW.USER32(?,?,?), ref: 010FFE9D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID: zBf7
                                      • API String ID: 1378638983-3720523620
                                      • Opcode ID: 9605a575e0eb8ae84be6e1ab02171a5cef10d62527d3665b9c50366b36bc898c
                                      • Instruction ID: d2ab8a67032427d9e970cefe3347fa688beac34c40964733b915f1a37150e0a4
                                      • Opcode Fuzzy Hash: 9605a575e0eb8ae84be6e1ab02171a5cef10d62527d3665b9c50366b36bc898c
                                      • Instruction Fuzzy Hash: 331133B58002098FDB20DF99D485BDEFBF8EB48324F20841AE955B3701C374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SendMessageW.USER32(?,?,?,?,?,?,?,?,00000000), ref: 04F9BCBD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: zBf7
                                      • API String ID: 3850602802-3720523620
                                      • Opcode ID: 0d6070ebfe77677e57318b6e78cebcf3b1c06083901d2d28f696ed7383503911
                                      • Instruction ID: ea7e045cc2294951098994e404f0d894dc3df1c418a9c4dc93af3ee27e81e0eb
                                      • Opcode Fuzzy Hash: 0d6070ebfe77677e57318b6e78cebcf3b1c06083901d2d28f696ed7383503911
                                      • Instruction Fuzzy Hash: 3911DFB59002499FDB20DF9AD988BEEBBF8FB48324F108419E515A7700C375A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SendMessageW.USER32(00000000,0000020A,?,00000000,?,?,?,?,04F9226A,?,00000000,?), ref: 04F9C435
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: zBf7
                                      • API String ID: 3850602802-3720523620
                                      • Opcode ID: 1f99297d5b50299b42c985173eab5fc48770ae07d8531c336fac11f70873d9d6
                                      • Instruction ID: c22ef06dc73767a369f10830da347a090cb201c57b4e7f2ef6333133c6f3972a
                                      • Opcode Fuzzy Hash: 1f99297d5b50299b42c985173eab5fc48770ae07d8531c336fac11f70873d9d6
                                      • Instruction Fuzzy Hash: 6711F2B59003489FDB20DF9AD988BEEBBF8EB48324F208419E515A7600D374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,00000018,00000001,?), ref: 04F9D29D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID: zBf7
                                      • API String ID: 410705778-3720523620
                                      • Opcode ID: 50b03eee9940ea0fa9e26d1409dd7e21734a13f0300b6d9bc152b66d17d6b5c5
                                      • Instruction ID: f5b44c378dbba6101773bdfbf1d092b94f1fa5ac85929ad43ad92c35d5bdee81
                                      • Opcode Fuzzy Hash: 50b03eee9940ea0fa9e26d1409dd7e21734a13f0300b6d9bc152b66d17d6b5c5
                                      • Instruction Fuzzy Hash: BB1106B58003089FEB10DF9AD544BEEBBF8EB48324F208419E915B7700C375A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,00000018,00000001,?), ref: 04F9D29D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID: zBf7
                                      • API String ID: 410705778-3720523620
                                      • Opcode ID: debde8703e5c3e293d2091293b8227abc3488c0b56303df96bbab9f68db73fd3
                                      • Instruction ID: 49f22e437d61dbf0ab47fb386833b2a523bc468df98e6965fa6c225ce79ab60d
                                      • Opcode Fuzzy Hash: debde8703e5c3e293d2091293b8227abc3488c0b56303df96bbab9f68db73fd3
                                      • Instruction Fuzzy Hash: C31106B58003499FDB10DF99D984BDEBFF8EB48324F20841AE515A7701C374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 010F962E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID: zBf7
                                      • API String ID: 4139908857-3720523620
                                      • Opcode ID: c04fe30a07dae5f821ed3c21b08640c12366d7447cbbfa4f377ebc6ad1a859a0
                                      • Instruction ID: bf5d9e479795112c472537330750686fae6147abe9c2e4a2e6a6f61aa4a8492f
                                      • Opcode Fuzzy Hash: c04fe30a07dae5f821ed3c21b08640c12366d7447cbbfa4f377ebc6ad1a859a0
                                      • Instruction Fuzzy Hash: 901110B5C002098FDB20CF9AC444BDEFBF4EF88228F10845AE559A7700C374A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 04F9F435
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: Initialize
                                      • String ID: zBf7
                                      • API String ID: 2538663250-3720523620
                                      • Opcode ID: 01e2924ed6add237d21164ff08bc27c59ca88aed727a05e917a9bd2ea4b11655
                                      • Instruction ID: bc1e4fc21d03b18b041410950be9062b0137a6aad602d9e85817391676cc4b15
                                      • Opcode Fuzzy Hash: 01e2924ed6add237d21164ff08bc27c59ca88aed727a05e917a9bd2ea4b11655
                                      • Instruction Fuzzy Hash: 8411F2B58002488FDB10DFAAD548B9ABFF8EB48328F148859E519A7610C374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SendMessageW.USER32(00000000,0000020A,?,00000000,?,?,?,?,04F9226A,?,00000000,?), ref: 04F9C435
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: zBf7
                                      • API String ID: 3850602802-3720523620
                                      • Opcode ID: d163ad24545b339880631473e9c8613d51a62fd68cf9af96a91b90a17c8d450f
                                      • Instruction ID: c959bb7cc6e68a9bb85c7d1cdea6bab2e45520c1f8e3b47d6ff50ab1a8ad5576
                                      • Opcode Fuzzy Hash: d163ad24545b339880631473e9c8613d51a62fd68cf9af96a91b90a17c8d450f
                                      • Instruction Fuzzy Hash: 541106B58003489FDB10DF9AD584BEFBFF8EB88324F108419E454A7601C374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 04F9F435
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: Initialize
                                      • String ID: zBf7
                                      • API String ID: 2538663250-3720523620
                                      • Opcode ID: 57099059230fa8d2d79fe920e77ea5a627ce784a2d85025880f7e07d42872d05
                                      • Instruction ID: 6a3c89c0f3bf5e4200139f992bd8f9aeccc2269ed5f09bcdeea4c0f02d866d10
                                      • Opcode Fuzzy Hash: 57099059230fa8d2d79fe920e77ea5a627ce784a2d85025880f7e07d42872d05
                                      • Instruction Fuzzy Hash: 6E1103B19042488FDB20DFAAD548B9EBBF8EB48364F108459E559B7700D374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SendMessageW.USER32(?,?,?,?,?,?,?,?,00000000), ref: 04F9BCBD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: zBf7
                                      • API String ID: 3850602802-3720523620
                                      • Opcode ID: d61de8f7f91965f570dfcf1674bb49c7b04c9f92cb77027b18ad34ec4418a7dc
                                      • Instruction ID: c2847c72b75f4f8cd7bbd6816cc3f2481fc5674ac57bf62fd27e6f68ed99608e
                                      • Opcode Fuzzy Hash: d61de8f7f91965f570dfcf1674bb49c7b04c9f92cb77027b18ad34ec4418a7dc
                                      • Instruction Fuzzy Hash: D911F2B5800248DFDB20DF9AD484BDEBBF8EB48324F208419E814A7700C374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetWindowLongW.USER32(?,?,?), ref: 010FFE9D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID: zBf7
                                      • API String ID: 1378638983-3720523620
                                      • Opcode ID: 14ba8329049c41402ccaaa396b927169f42006026e116e38afcc36ee175d64a3
                                      • Instruction ID: 32abe9cb253a3ec9c3c1c7d9e737ff9a1b07d1baaa098ea652277503759e9fa0
                                      • Opcode Fuzzy Hash: 14ba8329049c41402ccaaa396b927169f42006026e116e38afcc36ee175d64a3
                                      • Instruction Fuzzy Hash: 201115B58002099FDB20DF9AD585BDEBBF8EB48324F10845AE955B3701C374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395154087.0000000000DDD000.00000040.00000001.sdmp, Offset: 00DDD000, based on PE: false
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e17142a6a3d8ecba52751c57090d4b152fedbca8b558e0554226ee73281843a2
                                      • Instruction ID: 4ef1ff340cbcebf3bfc7a7d7cfdb98a64dc79fca59034e3ef679de39aed480d5
                                      • Opcode Fuzzy Hash: e17142a6a3d8ecba52751c57090d4b152fedbca8b558e0554226ee73281843a2
                                      • Instruction Fuzzy Hash: A92106B1504240DFDF11DF14E9C0B26BF66FB84328F2485AAE9050B356C336E855CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395209503.0000000000DFD000.00000040.00000001.sdmp, Offset: 00DFD000, based on PE: false
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8ae61274aef684e57e13076a19987d41b196f8d3ed10bd149b318ad7bcb87cc
                                      • Instruction ID: 2f03b3b66fecbf281654b34ca08e1e150ed87d2440a356aadaade4c546927cfe
                                      • Opcode Fuzzy Hash: a8ae61274aef684e57e13076a19987d41b196f8d3ed10bd149b318ad7bcb87cc
                                      • Instruction Fuzzy Hash: 4E21F2B1504248DFDB14DF24D9C0B26BB67FB84318F24C9A9EA4A4B346CB36D847CA71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395209503.0000000000DFD000.00000040.00000001.sdmp, Offset: 00DFD000, based on PE: false
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9bbc381b9f925ec6928b7a6ecda114fed02a3693c7b5b4413e0ea5f595feb325
                                      • Instruction ID: 4a2d406f8b0f33b4a3af3867552f77f1bd76ccac7b5c7c08f34ac7d57d45f49c
                                      • Opcode Fuzzy Hash: 9bbc381b9f925ec6928b7a6ecda114fed02a3693c7b5b4413e0ea5f595feb325
                                      • Instruction Fuzzy Hash: A52192755093C48FCB12CF24D990715BF72EB46314F29C5EAD8498B697C33A980ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395154087.0000000000DDD000.00000040.00000001.sdmp, Offset: 00DDD000, based on PE: false
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                      • Instruction ID: f407ac61332313910901cdc4a3c0e152e4d85dc57853f11c3f8db3ecb58265a3
                                      • Opcode Fuzzy Hash: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                      • Instruction Fuzzy Hash: 8411B476404280DFCF12CF14D5C4B16BF72FB85324F2885AAD8050B716C336D856CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Non-executed Functions

                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 04F9E289
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: CurrentThread
                                      • String ID: zBf7$zBf7
                                      • API String ID: 2882836952-3521261315
                                      • Opcode ID: 72716c4ebccf2eacb544e5661c7ec481ed0e2a95e17703eb4c6239cab21b37fc
                                      • Instruction ID: d582803594444f9b981a605baa3731a261a868c13c96b28efec4638d2b4d056a
                                      • Opcode Fuzzy Hash: 72716c4ebccf2eacb544e5661c7ec481ed0e2a95e17703eb4c6239cab21b37fc
                                      • Instruction Fuzzy Hash: 1A818E70D042488FEF14DFA5C854AEEBBF5EF88314F14846AD415AB790DB34A946CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetSystemMetrics.USER32(00000031), ref: 04F9B9EE
                                      • GetSystemMetrics.USER32(00000032), ref: 04F9BA28
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.397057305.0000000004F90000.00000040.00000001.sdmp, Offset: 04F90000, based on PE: false
                                      Similarity
                                      • API ID: MetricsSystem
                                      • String ID: zBf7
                                      • API String ID: 4116985748-3720523620
                                      • Opcode ID: 96b6baae49662333a8b4d520ca80200664cda9c44bb285527a187600fa3ef2b4
                                      • Instruction ID: 5e6276a55ad14fbd59cedee0023b2196578c9492bdb2e173ee9ddcc5f2e2df02
                                      • Opcode Fuzzy Hash: 96b6baae49662333a8b4d520ca80200664cda9c44bb285527a187600fa3ef2b4
                                      • Instruction Fuzzy Hash: C32125B19003499FDB20DF9AD44979EBFF4AB08325F14841AE459A7740D378A585CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetSystemMetrics.USER32(0000004B), ref: 010F7F5D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.395582697.00000000010F0000.00000040.00000001.sdmp, Offset: 010F0000, based on PE: false
                                      Similarity
                                      • API ID: MetricsSystem
                                      • String ID: X$zBf7
                                      • API String ID: 4116985748-3521624849
                                      • Opcode ID: 2038fdb472b8409a1e99aa006b0f0868d63a12da7272b8d58b63279608bece4a
                                      • Instruction ID: 9e6b2fc77c2f4e7ee57ec1600ecfc1c0e05e5c12518d69d28b0d283dc5363a4f
                                      • Opcode Fuzzy Hash: 2038fdb472b8409a1e99aa006b0f0868d63a12da7272b8d58b63279608bece4a
                                      • Instruction Fuzzy Hash: 3821C0B5804398CFDB20CFA5D5453EABFF4EB09314F14809ED594A7642C7399A09CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%