Loading ...

Play interactive tourEdit tour

Windows Analysis Report ALP.exe

Overview

General Information

Sample Name:ALP.exe
Analysis ID:483771
MD5:60e9f1e8596c98a6b07129d9c24ec359
SHA1:0e9e28f2853681a41a9ace446c0597320452bd9d
SHA256:658e8d30979add1dfcccd8adba33c136541fe1c9d24bfdeb3fadc5a5a5252716
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • ALP.exe (PID: 6264 cmdline: 'C:\Users\user\Desktop\ALP.exe' MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • ALP.exe (PID: 6484 cmdline: C:\Users\user\Desktop\ALP.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
      • schtasks.exe (PID: 6548 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6616 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • ALP.exe (PID: 6640 cmdline: C:\Users\user\Desktop\ALP.exe 0 MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • ALP.exe (PID: 6840 cmdline: C:\Users\user\Desktop\ALP.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
  • dhcpmon.exe (PID: 6800 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • dhcpmon.exe (PID: 5640 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
  • dhcpmon.exe (PID: 6896 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • dhcpmon.exe (PID: 4448 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x4358d:$a: NanoCore
    • 0x435e6:$a: NanoCore
    • 0x43623:$a: NanoCore
    • 0x4369c:$a: NanoCore
    • 0x56d47:$a: NanoCore
    • 0x56d5c:$a: NanoCore
    • 0x56d91:$a: NanoCore
    • 0x6fd23:$a: NanoCore
    • 0x6fd38:$a: NanoCore
    • 0x6fd6d:$a: NanoCore
    • 0x435ef:$b: ClientPlugin
    • 0x4362c:$b: ClientPlugin
    • 0x43f2a:$b: ClientPlugin
    • 0x43f37:$b: ClientPlugin
    • 0x56b03:$b: ClientPlugin
    • 0x56b1e:$b: ClientPlugin
    • 0x56b4e:$b: ClientPlugin
    • 0x56d65:$b: ClientPlugin
    • 0x56d9a:$b: ClientPlugin
    • 0x6fadf:$b: ClientPlugin
    • 0x6fafa:$b: ClientPlugin
    0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x4358d:$a: NanoCore
      • 0x435e6:$a: NanoCore
      • 0x43623:$a: NanoCore
      • 0x4369c:$a: NanoCore
      • 0x56d47:$a: NanoCore
      • 0x56d5c:$a: NanoCore
      • 0x56d91:$a: NanoCore
      • 0x6fd23:$a: NanoCore
      • 0x6fd38:$a: NanoCore
      • 0x6fd6d:$a: NanoCore
      • 0x435ef:$b: ClientPlugin
      • 0x4362c:$b: ClientPlugin
      • 0x43f2a:$b: ClientPlugin
      • 0x43f37:$b: ClientPlugin
      • 0x56b03:$b: ClientPlugin
      • 0x56b1e:$b: ClientPlugin
      • 0x56b4e:$b: ClientPlugin
      • 0x56d65:$b: ClientPlugin
      • 0x56d9a:$b: ClientPlugin
      • 0x6fadf:$b: ClientPlugin
      • 0x6fafa:$b: ClientPlugin
      0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xa02b5:$x1: NanoCore.ClientPluginHost
      • 0xd2cd5:$x1: NanoCore.ClientPluginHost
      • 0xa02f2:$x2: IClientNetworkHost
      • 0xd2d12:$x2: IClientNetworkHost
      • 0xa3e25:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0xd6845:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 39 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      12.2.ALP.exe.2a4949c.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      12.2.ALP.exe.2a4949c.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      12.2.ALP.exe.3a2b7ae.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0x145e3:$x1: NanoCore.ClientPluginHost
      • 0x2d5bf:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      • 0x14610:$x2: IClientNetworkHost
      • 0x2d5ec:$x2: IClientNetworkHost
      12.2.ALP.exe.3a2b7ae.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x145e3:$x2: NanoCore.ClientPluginHost
      • 0x2d5bf:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0x156be:$s4: PipeCreated
      • 0x2e69a:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      • 0x145fd:$s5: IClientLoggingHost
      • 0x2d5d9:$s5: IClientLoggingHost
      12.2.ALP.exe.3a2b7ae.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 42 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: ALP.exeVirustotal: Detection: 34%Perma Link
        Source: ALP.exeReversingLabs: Detection: 30%
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 30%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: ALP.exeJoe Sandbox ML: detected
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 12.2.ALP.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: ALP.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: ALP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49737 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49738 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49758 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49777 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49786 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49787 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49788 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49789 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49790 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49795 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49796 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49797 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49798 -> 185.174.101.21:7712
        Source: global trafficTCP traffic: 192.168.2.3:49737 -> 185.174.101.21:7712
        Source: unknownDNS traffic detected: queries for: godisgood1.hopto.org
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 12.2.ALP.exe.2a4949c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        .NET source code contains very large stringsShow sources
        Source: ALP.exe, Forms/mainForm.csLong String: Length: 38272
        Source: 0.0.ALP.exe.fd0000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 0.2.ALP.exe.fd0000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: dhcpmon.exe.4.dr, Forms/mainForm.csLong String: Length: 38272
        Source: 4.0.ALP.exe.770000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 9.0.ALP.exe.190000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 9.2.ALP.exe.190000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 11.0.dhcpmon.exe.150000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 11.2.dhcpmon.exe.150000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 12.2.ALP.exe.5e0000.1.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 12.0.ALP.exe.5e0000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: ALP.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 12.2.ALP.exe.2a4949c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.2a4949c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D31780_2_019D3178
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D61980_2_019D6198
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D31680_2_019D3168
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D340B0_2_019D340B
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D339E0_2_019D339E
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D33920_2_019D3392
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D33BD0_2_019D33BD
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D2E580_2_019D2E58
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D06500_2_019D0650
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D2E680_2_019D2E68
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336C1240_2_0336C124
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336E5700_2_0336E570
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336E5610_2_0336E561
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_022FC1249_2_022FC124
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_022FE5629_2_022FE562
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_022FE5709_2_022FE570
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045131789_2_04513178
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_0451340B9_2_0451340B
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045131729_2_04513172
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045161989_2_04516198
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045133929_2_04513392
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_0451339E9_2_0451339E
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045133BD9_2_045133BD
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04512E589_2_04512E58
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04512E689_2_04512E68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00B8C12411_2_00B8C124
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00B8E57011_2_00B8E570
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00B8E56211_2_00B8E562
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450317811_2_04503178
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450340B11_2_0450340B
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04502E5811_2_04502E58
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04502E6811_2_04502E68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450317311_2_04503173
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450619811_2_04506198
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450339211_2_04503392
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450339E11_2_0450339E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_045033BD11_2_045033BD
        Source: C:\Users\user\Desktop\ALP.exeCode function: 12_2_00EAE48012_2_00EAE480
        Source: C:\Users\user\Desktop\ALP.exeCode function: 12_2_00EAE47112_2_00EAE471
        Source: C:\Users\user\Desktop\ALP.exeCode function: 12_2_00EABBD412_2_00EABBD4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02B7C12413_2_02B7C124
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02B7E57013_2_02B7E570
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02B7E56113_2_02B7E561
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2619813_2_04D26198
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2317813_2_04D23178
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2340B13_2_04D2340B
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2065013_2_04D20650
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D22E5813_2_04D22E58
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D22E6813_2_04D22E68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2316A13_2_04D2316A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2339213_2_04D23392
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2339E13_2_04D2339E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D233BD13_2_04D233BD
        Source: ALP.exe, 00000000.00000002.239605838.0000000006540000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs ALP.exe
        Source: ALP.exe, 00000000.00000002.235666241.00000000033B7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs ALP.exe
        Source: ALP.exe, 00000000.00000002.234119397.0000000001066000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 00000004.00000000.232573322.0000000000806000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 00000004.00000003.249895451.00000000064DE000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs ALP.exe
        Source: ALP.exe, 00000009.00000002.252404689.0000000000226000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 00000009.00000002.263876804.0000000002527000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs ALP.exe
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs ALP.exe
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs ALP.exe
        Source: ALP.exe, 0000000C.00000000.250850600.0000000000676000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs ALP.exe
        Source: ALP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: ALP.exeVirustotal: Detection: 34%
        Source: ALP.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\Desktop\ALP.exeFile read: C:\Users\user\Desktop\ALP.exeJump to behavior
        Source: ALP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\ALP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\ALP.exe 'C:\Users\user\Desktop\ALP.exe'
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exeJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ALP.exe.logJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1584.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@18/11@17/1
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6572:120:WilError_01
        Source: C:\Users\user\Desktop\ALP.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9ed8d108-2eb1-4e23-9679-783796e4baff}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6632:120:WilError_01
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: ALP.exe, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.ALP.exe.fd0000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.2.ALP.exe.fd0000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: dhcpmon.exe.4.dr, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.0.ALP.exe.770000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 9.0.ALP.exe.190000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\ALP.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: ALP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: ALP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: ALP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: ALP.exe, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.ALP.exe.fd0000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.ALP.exe.fd0000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.4.dr, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.ALP.exe.770000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 9.0.ALP.exe.190000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 9.2.ALP.exe.190000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.dhcpmon.exe.150000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.dhcpmon.exe.150000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.2.ALP.exe.5e0000.1.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.ALP.exe.5e0000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D11D8 push ds; ret 0_2_019D11DF
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D4001 push ecx; retf 0_2_019D4007
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D3FFC push ecx; retf 0_2_019D3FFD
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336F933 push esp; iretd 0_2_0336F939
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04514001 push ecx; retf 9_2_04514007
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045111D8 push ds; ret 9_2_045111DF
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04513FFC push ecx; retf 9_2_04513FFD
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04503FFC push ecx; retf 11_2_04503FFD
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04504001 push ecx; retf 11_2_04504007
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_045011D8 push ds; ret 11_2_045011DF
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D23FFC push ecx; retf 13_2_04D23FFD
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D24001 push ecx; retf 13_2_04D24007
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D211D8 push ds; ret 13_2_04D211DF
        Source: ALP.exeStatic PE information: 0x8C4B6098 [Tue Aug 2 11:29:28 2044 UTC]
        Source: initial sampleStatic PE information: section name: .text entropy: 7.26903403564
        Source: initial sampleStatic PE information: section name: .text entropy: 7.26903403564
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\ALP.exeFile opened: C:\Users\user\Desktop\ALP.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6264, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6640, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6800, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6896, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: ALP.exe, 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, ALP.exe, 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: ALP.exe, 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, ALP.exe, 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\ALP.exe TID: 6268Thread sleep time: -35752s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ALP.exe TID: 6320Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ALP.exe TID: 6724Thread sleep time: -14757395258967632s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ALP.exe TID: 6644Thread sleep time: -34772s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ALP.exe TID: 6720Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6804Thread sleep time: -43449s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6832Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ALP.exe TID: 6864Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6900Thread sleep time: -41618s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7140Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: threadDelayed 2780Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: threadDelayed 6488Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: foregroundWindowGot 616Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: foregroundWindowGot 725Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 35752Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 34772Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 43449Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41618Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\user\Desktop\ALP.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\ALP.exeMemory written: C:\Users\user\Desktop\ALP.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeMemory written: C:\Users\user\Desktop\ALP.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exeJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: ALP.exe, 00000004.00000003.249895451.00000000064DE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection111Masquerading2Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemorySecurity Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 483771 Sample: ALP.exe Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 45 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Multi AV Scanner detection for dropped file 2->49 51 10 other signatures 2->51 8 ALP.exe 3 2->8         started        12 ALP.exe 2 2->12         started        14 dhcpmon.exe 3 2->14         started        16 dhcpmon.exe 2 2->16         started        process3 file4 41 C:\Users\user\AppData\Local\...\ALP.exe.log, ASCII 8->41 dropped 55 Uses schtasks.exe or at.exe to add and modify task schedules 8->55 57 Injects a PE file into a foreign processes 8->57 18 ALP.exe 1 15 8->18         started        23 ALP.exe 2 12->23         started        signatures5 process6 dnsIp7 43 godisgood1.hopto.org 185.174.101.21, 49737, 49738, 49743 ASN-QUADRANET-GLOBALUS Ukraine 18->43 33 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->33 dropped 35 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->35 dropped 37 C:\Users\user\AppData\Local\...\tmp1584.tmp, XML 18->37 dropped 39 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->39 dropped 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->53 25 schtasks.exe 1 18->25         started        27 schtasks.exe 1 18->27         started        file8 signatures9 process10 process11 29 conhost.exe 25->29         started        31 conhost.exe 27->31         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        ALP.exe34%VirustotalBrowse
        ALP.exe30%ReversingLabs
        ALP.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe30%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        12.2.ALP.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        godisgood1.hopto.org
        185.174.101.21
        truefalse
          high

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          185.174.101.21
          godisgood1.hopto.orgUkraine
          8100ASN-QUADRANET-GLOBALUSfalse

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:483771
          Start date:15.09.2021
          Start time:13:21:04
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 14m 4s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:ALP.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:35
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@18/11@17/1
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.2% (good quality ratio 0.2%)
          • Quality average: 81.1%
          • Quality standard deviation: 5.2%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 159
          • Number of non-executed functions: 6
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 184.30.21.144, 23.35.236.56, 20.50.102.62, 40.112.88.60, 23.203.67.116, 23.203.69.124, 23.216.77.208, 23.216.77.209, 20.82.209.183
          • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, tile-service.weather.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, e15275.g.akamaiedge.net, a1449.dscg2.akamai.net, arc.msn.com, cdn.onenote.net.edgekey.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, wildcard.weather.microsoft.com.edgekey.net, arc.trafficmanager.net, e1553.dspg.akamaiedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net
          • Not all processes where analyzed, report is missing behavior information
          • Report creation exceeded maximum time and may have missing behavior and disassembly information.
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          13:22:04API Interceptor960x Sleep call for process: ALP.exe modified
          13:22:08AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          13:22:10Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\ALP.exe" s>$(Arg0)
          13:22:13Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
          13:22:20API Interceptor2x Sleep call for process: dhcpmon.exe modified

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          No context

          Created / dropped Files

          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):603136
          Entropy (8bit):7.259103638799268
          Encrypted:false
          SSDEEP:6144:yEAverZlQDbCMN4K4CJdAbOo36JSGgR9Smne2bEWeeKy2o+0UdzDcQRe2k3OCBuq:1WHCM2K4C4ovgkuK/o+0UmQDk3BuAt/
          MD5:60E9F1E8596C98A6B07129D9C24EC359
          SHA1:0E9E28F2853681A41A9ACE446C0597320452BD9D
          SHA-256:658E8D30979ADD1DFCCCD8ADBA33C136541FE1C9D24BFDEB3FADC5A5A5252716
          SHA-512:8BB79D52B6997C26EDBC94D2CB2DDB8E679ACF77230335EC6A09EC7280DCE5C711D0630007BB33FDE03A5983FC533C89D7A77FD6673FB2100833B82EEBEB820A
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 30%
          Reputation:unknown
          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....`K...............0..*...........H... ...`....@.. ....................................@.................................hH..O....`..............................LH............................................... ............... ..H............text....(... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............2..............@..B.................H......H........?...^......o...T...............................................~..$}......}......}.....(......*...$}......}......}.....(........}......}....*...0..O.........$}......}......}.....(........{....}......{....}......{....}......{....}....*:..{....(.....*...0..w..........R.{........,f.r...p(....-).r!..p(....-%.r-..p(....-%.r9..p(....-%+0..}....+'..J.{....XT+...J.{....XT+...J.{....XT+.*..0...........rE..p.+..*..0...........ro..p.+..*..0..................+..*".(.....*....0..
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Reputation:unknown
          Preview: [ZoneTransfer]....ZoneId=0
          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ALP.exe.log
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1216
          Entropy (8bit):5.355304211458859
          Encrypted:false
          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
          MD5:FED34146BF2F2FA59DCF8702FCC8232E
          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
          Malicious:true
          Reputation:unknown
          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1216
          Entropy (8bit):5.355304211458859
          Encrypted:false
          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
          MD5:FED34146BF2F2FA59DCF8702FCC8232E
          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
          Malicious:false
          Reputation:unknown
          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
          C:\Users\user\AppData\Local\Temp\tmp1584.tmp
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1293
          Entropy (8bit):5.098992324361618
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0bhxtn:cbk4oL600QydbQxIYODOLedq3+hj
          MD5:D956409A7F9A04D5719AC93B66C05125
          SHA1:BB7FE2ACDD9B2670D2B115E2930DB8E008CC7B66
          SHA-256:2A5E542949A1F48675123A33E29B603C8BAA1C4403EF20C30E7918B5AF3BA24E
          SHA-512:D7050605AC5D5F753ABA13075E7F49DB8C47574BFD6CDA4AF3E73F6BF51005423D1B1A4332D5977613335F03BF73B7CC9F203C10D17C5469079E1BE26CC7A70C
          Malicious:true
          Reputation:unknown
          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          C:\Users\user\AppData\Local\Temp\tmp196D.tmp
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1310
          Entropy (8bit):5.109425792877704
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
          Malicious:false
          Reputation:unknown
          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:data
          Category:dropped
          Size (bytes):1856
          Entropy (8bit):7.089541637477408
          Encrypted:false
          SSDEEP:48:IknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhL:HjhDjhDjhDjhDjhDjhDjhDjhL
          MD5:30D23CC577A89146961915B57F408623
          SHA1:9B5709D6081D8E0A570511E6E0AAE96FA041964F
          SHA-256:E2130A72E55193D402B5F43F7F3584ECF6B423F8EC4B1B1B69AD693C7E0E5A9E
          SHA-512:2D5C5747FD04F8326C2CC1FB313925070BC01D3352AFA6C36C167B72757A15F58B6263D96BD606338DA055812E69DDB628A6E18D64DD59697C2F42D1C58CC687
          Malicious:false
          Reputation:unknown
          Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:Non-ISO extended-ASCII text, with no line terminators
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:Hyn:Hy
          MD5:91F97BE3A5A07812C876B2CFAE334B19
          SHA1:7BF51BB4B5B5E66711E7A42C861E6B56F9E04432
          SHA-256:A6D6BF4A29F7FC8877601FDA279183565E357A0A15B386A3653F8BEC6BD25BA6
          SHA-512:BBA20900727377668DCFDDCD33A1CA0A67E271E850AC6258825EDE5100DC60AD215074CB10258718844ADB58472AC98CCC1C1F9154E759BD3198FD9749CF3213
          Malicious:true
          Reputation:unknown
          Preview: G..~.x.H
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:data
          Category:modified
          Size (bytes):40
          Entropy (8bit):5.153055907333276
          Encrypted:false
          SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
          MD5:4E5E92E2369688041CC82EF9650EDED2
          SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
          SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
          SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
          Malicious:false
          Reputation:unknown
          Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:data
          Category:dropped
          Size (bytes):327768
          Entropy (8bit):7.999367066417797
          Encrypted:true
          SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
          MD5:2E52F446105FBF828E63CF808B721F9C
          SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
          SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
          SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
          Malicious:false
          Reputation:unknown
          Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):30
          Entropy (8bit):4.148394345536403
          Encrypted:false
          SSDEEP:3:oNWXp5vkp2dA:oNWXpFkp2C
          MD5:D71F830F25284967D78C5C979EF8A7FE
          SHA1:FA4FC2F5C82658A6A5765EC66F30F993C21EDA26
          SHA-256:84A815A94DBF4EF7BDF2867466F880341415080F918CC91F2CA3DFAECAF1A490
          SHA-512:DB529CABD7057AA8C57CB89DAC5DA55341666324BC1BB0D090AB48C8275EA7A41D993E7D2AB29CC7873CF0E96889A968B0EA4C5849AAE1BF2F6AF46684467E85
          Malicious:false
          Reputation:unknown
          Preview: C:\Users\user\Desktop\ALP.exe

          Static File Info

          General

          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.259103638799268
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:ALP.exe
          File size:603136
          MD5:60e9f1e8596c98a6b07129d9c24ec359
          SHA1:0e9e28f2853681a41a9ace446c0597320452bd9d
          SHA256:658e8d30979add1dfcccd8adba33c136541fe1c9d24bfdeb3fadc5a5a5252716
          SHA512:8bb79d52b6997c26edbc94d2cb2ddb8e679acf77230335ec6a09ec7280dce5c711d0630007bb33fde03a5983fc533c89d7a77fd6673fb2100833b82eebeb820a
          SSDEEP:6144:yEAverZlQDbCMN4K4CJdAbOo36JSGgR9Smne2bEWeeKy2o+0UdzDcQRe2k3OCBuq:1WHCM2K4C4ovgkuK/o+0UmQDk3BuAt/
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....`K...............0..*...........H... ...`....@.. ....................................@................................

          File Icon

          Icon Hash:00828e8e8686b000

          Static PE Info

          General

          Entrypoint:0x4948ba
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x8C4B6098 [Tue Aug 2 11:29:28 2044 UTC]
          TLS Callbacks:
          CLR (.Net) Version:v4.0.30319
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

          Entrypoint Preview

          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al

          Data Directories

          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x948680x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x960000x5bc.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x980000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x9484c0x1c.text
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

          Sections

          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x928c00x92a00False0.779385123615data7.26903403564IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .rsrc0x960000x5bc0x600False0.422526041667data4.10411488678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x980000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

          Resources

          NameRVASizeTypeLanguageCountry
          RT_VERSION0x960900x32cdata
          RT_MANIFEST0x963cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

          Imports

          DLLImport
          mscoree.dll_CorExeMain

          Version Infos

          DescriptionData
          Translation0x0000 0x04b0
          LegalCopyrightCopyright 2019
          Assembly Version1.0.0.0
          InternalNameCurrencyWrapp.exe
          FileVersion1.0.0.0
          CompanyName
          LegalTrademarks
          Comments
          ProductNameDisciples
          ProductVersion1.0.0.0
          FileDescriptionDisciples
          OriginalFilenameCurrencyWrapp.exe

          Network Behavior

          Snort IDS Alerts

          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          09/15/21-13:22:12.853834UDP254DNS SPOOF query response with TTL of 1 min. and no authority53649388.8.8.8192.168.2.3
          09/15/21-13:22:13.241852TCP2025019ET TROJAN Possible NanoCore C2 60B497377712192.168.2.3185.174.101.21
          09/15/21-13:22:21.114784TCP2025019ET TROJAN Possible NanoCore C2 60B497387712192.168.2.3185.174.101.21
          09/15/21-13:22:27.938934UDP254DNS SPOOF query response with TTL of 1 min. and no authority53559848.8.8.8192.168.2.3
          09/15/21-13:22:28.099478TCP2025019ET TROJAN Possible NanoCore C2 60B497437712192.168.2.3185.174.101.21
          09/15/21-13:22:34.652919UDP254DNS SPOOF query response with TTL of 1 min. and no authority53651108.8.8.8192.168.2.3
          09/15/21-13:22:34.897642TCP2025019ET TROJAN Possible NanoCore C2 60B497467712192.168.2.3185.174.101.21
          09/15/21-13:22:42.233206UDP254DNS SPOOF query response with TTL of 1 min. and no authority53583618.8.8.8192.168.2.3
          09/15/21-13:22:42.392415TCP2025019ET TROJAN Possible NanoCore C2 60B497477712192.168.2.3185.174.101.21
          09/15/21-13:22:49.136770UDP254DNS SPOOF query response with TTL of 1 min. and no authority53634928.8.8.8192.168.2.3
          09/15/21-13:22:49.295921TCP2025019ET TROJAN Possible NanoCore C2 60B497487712192.168.2.3185.174.101.21
          09/15/21-13:22:56.152735TCP2025019ET TROJAN Possible NanoCore C2 60B497587712192.168.2.3185.174.101.21
          09/15/21-13:23:04.336455TCP2025019ET TROJAN Possible NanoCore C2 60B497777712192.168.2.3185.174.101.21
          09/15/21-13:23:10.294889UDP254DNS SPOOF query response with TTL of 1 min. and no authority53593498.8.8.8192.168.2.3
          09/15/21-13:23:10.454663TCP2025019ET TROJAN Possible NanoCore C2 60B497867712192.168.2.3185.174.101.21
          09/15/21-13:23:16.512568TCP2025019ET TROJAN Possible NanoCore C2 60B497877712192.168.2.3185.174.101.21
          09/15/21-13:23:24.417530UDP254DNS SPOOF query response with TTL of 1 min. and no authority53588238.8.8.8192.168.2.3
          09/15/21-13:23:24.629528TCP2025019ET TROJAN Possible NanoCore C2 60B497887712192.168.2.3185.174.101.21
          09/15/21-13:23:31.488898UDP254DNS SPOOF query response with TTL of 1 min. and no authority53575688.8.8.8192.168.2.3
          09/15/21-13:23:31.648678TCP2025019ET TROJAN Possible NanoCore C2 60B497897712192.168.2.3185.174.101.21
          09/15/21-13:23:38.181844TCP2025019ET TROJAN Possible NanoCore C2 60B497907712192.168.2.3185.174.101.21
          09/15/21-13:23:44.940027TCP2025019ET TROJAN Possible NanoCore C2 60B497957712192.168.2.3185.174.101.21
          09/15/21-13:23:52.013541UDP254DNS SPOOF query response with TTL of 1 min. and no authority53554358.8.8.8192.168.2.3
          09/15/21-13:23:52.194930TCP2025019ET TROJAN Possible NanoCore C2 60B497967712192.168.2.3185.174.101.21
          09/15/21-13:23:59.061052TCP2025019ET TROJAN Possible NanoCore C2 60B497977712192.168.2.3185.174.101.21
          09/15/21-13:24:05.994918TCP2025019ET TROJAN Possible NanoCore C2 60B497987712192.168.2.3185.174.101.21

          Network Port Distribution

          TCP Packets

          TimestampSource PortDest PortSource IPDest IP
          Sep 15, 2021 13:22:13.020806074 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.177186012 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.177298069 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.241852045 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.414644957 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.414748907 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.630182028 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.630240917 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.786406994 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.802582979 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.004131079 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010858059 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010895014 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010920048 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010943890 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.011013031 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.011039972 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.172450066 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172557116 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172580957 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172602892 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172626972 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172645092 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172665119 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172683001 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.172689915 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172785997 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.235379934 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.331872940 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.331934929 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333822966 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333856106 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333879948 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333893061 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333904028 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333905935 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333925962 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333929062 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333946943 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333956957 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333966970 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333981991 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333997965 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334006071 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334021091 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334029913 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334042072 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334054947 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334070921 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334079027 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334089041 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334104061 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334127903 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334146976 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334156036 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334180117 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334211111 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.447072983 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.489432096 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.489473104 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.489589930 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491110086 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491252899 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491277933 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491303921 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491328955 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491331100 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491350889 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491374969 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491400957 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491405010 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491430998 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491453886 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491476059 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491497993 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491519928 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491542101 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491548061 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491574049 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491584063 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491600037 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491624117 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491631031 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491652966 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491677999 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491700888 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491720915 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491724968 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491753101 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491775990 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491800070 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491822004 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491847992 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491862059 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491872072 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491894960 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491936922 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.492019892 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.647950888 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648046970 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648149967 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.648199081 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648281097 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648334026 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.648684978 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648725033 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648751974 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648777962 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648787975 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.648804903 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648828983 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.648829937 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648857117 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648878098 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648880005 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.648901939 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648929119 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648952007 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.648952007 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648988962 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648993015 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649013042 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649034023 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649035931 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649055004 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649077892 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649086952 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649102926 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649125099 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649127007 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649148941 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649159908 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649172068 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649195910 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649219036 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649226904 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649241924 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649262905 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649269104 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649296045 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649319887 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649338007 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649344921 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649369955 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649380922 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649396896 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649413109 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649425030 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649451017 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649473906 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649482012 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649497032 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649512053 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649518013 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649539948 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649559975 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649579048 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649588108 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649600029 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649620056 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649627924 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649645090 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649669886 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649688959 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649703979 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649713993 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649735928 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649756908 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.649765968 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.649808884 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.805095911 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.805135012 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.805295944 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.805325031 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.805355072 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.805416107 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.806571007 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807092905 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807154894 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807178974 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807188034 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807199955 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807223082 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807233095 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807244062 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807267904 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807274103 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807290077 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807311058 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807320118 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807332039 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807354927 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807364941 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807380915 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807404995 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807405949 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807451010 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807473898 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807480097 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807502031 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807523012 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807528019 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807543993 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807565928 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807569981 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807586908 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807607889 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807610035 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807629108 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807651043 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807655096 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807678938 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807699919 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807699919 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807722092 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807742119 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807761908 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807774067 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807796955 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807797909 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807817936 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807842970 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807843924 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807867050 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807888985 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807893038 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807912111 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807934046 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807934999 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807956934 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.807976007 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.807980061 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.808002949 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.808022976 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.808028936 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.808053017 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.808074951 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.808074951 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.808098078 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.808120012 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.808123112 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.808178902 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.961333036 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.961374998 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.961400032 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.961421013 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.961740971 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.964184046 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.964391947 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.964524984 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.964550972 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.964659929 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.964751005 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.964792013 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.964894056 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965003967 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.965032101 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965229034 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965344906 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.965370893 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965501070 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965584040 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.965606928 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965713978 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965852976 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.965861082 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.965948105 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966063023 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.966119051 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966207981 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966309071 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.966361046 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966448069 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966552019 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.966583967 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966700077 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966806889 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.966864109 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966959953 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.966996908 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967015982 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967031956 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967047930 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967063904 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967063904 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967078924 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967096090 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967112064 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967156887 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967181921 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967201948 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967216015 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967217922 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967235088 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967251062 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967271090 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967293024 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967317104 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967331886 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967344046 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967369080 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967384100 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967392921 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967416048 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967437983 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967459917 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967480898 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967494965 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967502117 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967528105 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967552900 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967566967 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967575073 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967601061 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967626095 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967637062 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967648983 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967674017 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967700005 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967710018 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967730999 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967756987 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967765093 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967777967 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967802048 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967823982 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967844963 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967863083 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.967866898 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967890978 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967919111 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967942953 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967959881 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.967984915 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968008041 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.968008995 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968034983 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968059063 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968081951 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968106031 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968130112 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968152046 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968175888 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.968177080 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968199968 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.968250036 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.968276024 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.119159937 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119224072 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119251966 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119275093 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119297028 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119294882 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.119323015 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119333029 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.119349957 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119374990 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.119390965 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.119420052 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.124161959 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.124867916 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.124902964 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.124922037 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.124947071 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.124962091 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.124972105 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.124996901 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125001907 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125021935 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125030994 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125051022 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125065088 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125077963 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125098944 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125123978 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125127077 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125148058 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125165939 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125174046 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125196934 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125226974 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125236034 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125255108 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125277996 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125298977 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125310898 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125324011 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125346899 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125358105 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125369072 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125391960 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125401020 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125416040 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125428915 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125442982 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125468969 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125483990 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.125490904 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:15.125541925 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:15.217278004 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:20.958503008 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:21.113933086 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:21.114037991 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:21.114784002 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:21.286299944 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:21.294137955 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:21.449903965 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:21.450036049 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:21.656403065 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:21.664962053 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:21.878326893 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:21.940284014 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:22.016648054 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:22.172353029 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:22.313468933 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:22.428421021 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:22.634371996 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:22.635317087 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:22.791165113 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:22.862874985 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:23.018393040 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:23.042946100 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:23.245352030 CEST771249738185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:23.777808905 CEST497387712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:27.940360069 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:28.098387957 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:28.098773956 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:28.099478006 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:28.283534050 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:28.294713974 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:28.452303886 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:28.453660965 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:28.663104057 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:28.663249016 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:28.723984957 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:28.767182112 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:28.821772099 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:28.824948072 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:29.033956051 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:29.034189939 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:29.192342043 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:29.235965014 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:29.393471003 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:29.439377069 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:29.548835993 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:29.756053925 CEST771249743185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:30.550776958 CEST497437712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:34.654454947 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:34.811609983 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:34.819488049 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:34.897641897 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:35.066317081 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:35.111459970 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:35.137505054 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:35.294205904 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:35.296602964 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:35.502779007 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:35.564280033 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:35.566091061 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:35.722429037 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:35.722558022 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:35.927597046 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:35.927722931 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:36.083831072 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:36.127970934 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:36.283900023 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:36.330358028 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:36.549952984 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:36.756510019 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:37.090558052 CEST771249746185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:37.143713951 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:37.980943918 CEST497467712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:42.235184908 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:42.391226053 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:42.391459942 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:42.392415047 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:42.571316957 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:42.580462933 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:42.737160921 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:42.743973017 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:42.950314999 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:42.955796003 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:43.037162066 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:43.081001997 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:43.111731052 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:43.111856937 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:43.311599970 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:43.311705112 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:43.469130993 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:43.518503904 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:43.674504995 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:43.721589088 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:43.784636974 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:43.990294933 CEST771249747185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:44.801191092 CEST497477712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:49.138204098 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:49.293595076 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:49.295249939 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:49.295921087 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:49.504672050 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:49.847654104 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:49.889919043 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:49.890011072 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:50.054620981 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:50.055144072 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:50.210947037 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:50.213248968 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:50.413676023 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:50.521398067 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:50.522854090 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:50.678246975 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:50.682496071 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:50.837934017 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:50.838071108 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:50.993437052 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:50.993530989 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:51.149766922 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:51.192533970 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:51.912892103 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:52.049674034 CEST771249748185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:52.051100016 CEST497487712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:55.986093044 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:56.147475004 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:56.151854038 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:56.152734995 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:56.326148987 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:56.378957033 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:56.909986019 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:57.071518898 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:57.071621895 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:57.283262014 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:57.283404112 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:57.495215893 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:57.569392920 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:57.613456011 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:57.624998093 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:57.774765015 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:57.816615105 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:57.840254068 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:59.022330999 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:59.103063107 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:59.103208065 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:59.183871984 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:59.238526106 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:59.264930010 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:59.265183926 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:59.399790049 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:59.441901922 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:59.476322889 CEST771249758185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:00.058900118 CEST497587712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:04.176032066 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:04.335633993 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:04.335753918 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:04.336455107 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:04.512636900 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:04.552110910 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:04.716408968 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:04.770915985 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:04.870054960 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:05.082014084 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:05.146056890 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:05.147469044 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:05.306658983 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:05.306777000 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:05.518167019 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:05.518305063 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:05.678354025 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:05.739185095 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:05.912790060 CEST771249777185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:05.957890987 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:06.196439981 CEST497777712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:10.296066046 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:10.453768015 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:10.453891039 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:10.454663038 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:10.632355928 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:10.632581949 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:10.793138981 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:10.794684887 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:11.004364014 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:11.065757990 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:11.070024014 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:11.228770971 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:11.270814896 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:11.275649071 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:11.481964111 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:11.482422113 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:11.640495062 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:11.640594006 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:11.797982931 CEST771249786185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:11.848965883 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:12.271893024 CEST497867712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:16.355539083 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:16.511605024 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:16.511694908 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:16.512567997 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:16.684601068 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:16.706075907 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:16.862492085 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:16.893671036 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:17.108500004 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:17.174159050 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:17.224509954 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:17.381949902 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:17.443248987 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:18.415714025 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:18.626631021 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:18.626979113 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:18.783807993 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:18.852494001 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:19.008618116 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:19.052764893 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:19.210448027 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:19.255906105 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:19.350372076 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:19.552552938 CEST771249787185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:20.353143930 CEST497877712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:24.419291973 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:24.575357914 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:24.575730085 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:24.629528046 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:24.797281027 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:24.831471920 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:24.987647057 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:24.989303112 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:25.193375111 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:25.266105890 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:25.266995907 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:25.422892094 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:25.422983885 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:25.634439945 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:25.637655020 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:25.793613911 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:25.834717035 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:25.990883112 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:26.037681103 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:26.436247110 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:26.648957014 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:27.069191933 CEST771249788185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:27.116055012 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:27.423155069 CEST497887712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:31.489978075 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:31.648032904 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:31.648154020 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:31.648678064 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:31.823597908 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:31.855714083 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:32.014116049 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:32.015203953 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:32.227219105 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:32.283926010 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:32.284795046 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:32.442817926 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:32.444235086 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:32.607211113 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:32.607325077 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:32.765562057 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:32.819638014 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:33.049658060 CEST771249789185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:33.100898027 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:33.507808924 CEST497897712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.024949074 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.181113005 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:38.181283951 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.181843996 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.365632057 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:38.366250992 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.523760080 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:38.525743961 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.729213953 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:38.729291916 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.798551083 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:38.851334095 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:38.885499954 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:38.885705948 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:39.095854044 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:39.096092939 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:39.253628016 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:39.304521084 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:39.460491896 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:39.507668972 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:39.649463892 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:39.855820894 CEST771249790185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:40.649194002 CEST497907712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:44.779544115 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:44.938990116 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:44.939127922 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:44.940026999 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:45.111773014 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:45.112467051 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:45.272435904 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:45.274410963 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:45.483892918 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:45.551297903 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:45.552855015 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:45.712281942 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:45.712562084 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:45.926913977 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:45.934062958 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:46.093331099 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:46.133198023 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:46.292365074 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:46.337357044 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:46.748187065 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:46.955864906 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:47.457046032 CEST771249795185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:47.508325100 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:47.712342024 CEST497957712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.014869928 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.174154043 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:52.174310923 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.194930077 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.368029118 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:52.376868010 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.536461115 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:52.538239956 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.749767065 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:52.749944925 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.816553116 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:52.868259907 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:52.909938097 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:52.910084963 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:53.116806030 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:53.117104053 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:53.276621103 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:53.321396112 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:53.480735064 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:53.524519920 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:53.713031054 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:53.929869890 CEST771249796185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:54.712708950 CEST497967712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:58.898587942 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:59.059937954 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:59.060179949 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:59.061052084 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:59.240715981 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:59.243699074 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:59.405517101 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:59.409262896 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:59.621860027 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:59.692601919 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:59.694215059 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:23:59.855560064 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:23:59.855799913 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:00.068854094 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:00.069075108 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:00.230658054 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:00.275098085 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:00.437520981 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:00.478169918 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:00.713496923 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:00.798670053 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:00.798739910 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:00.930705070 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:01.389204025 CEST771249797185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:01.431411982 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:01.713818073 CEST497977712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:05.825074911 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:05.992285013 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:05.992572069 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:05.994918108 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:06.207158089 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:06.207850933 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:06.369833946 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:06.371145010 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:06.572391987 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:06.645342112 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:06.647152901 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:06.807589054 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:06.807789087 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:07.015438080 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:07.015686035 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:07.093326092 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:07.134974957 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:07.228394032 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:07.294760942 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:07.338155985 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:08.110410929 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:08.166342974 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:15.094645023 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:15.135634899 CEST497987712192.168.2.3185.174.101.21
          Sep 15, 2021 13:24:15.875296116 CEST771249798185.174.101.21192.168.2.3
          Sep 15, 2021 13:24:15.917005062 CEST497987712192.168.2.3185.174.101.21

          UDP Packets

          TimestampSource PortDest PortSource IPDest IP
          Sep 15, 2021 13:21:55.225199938 CEST5062053192.168.2.38.8.8.8
          Sep 15, 2021 13:21:55.260210991 CEST53506208.8.8.8192.168.2.3
          Sep 15, 2021 13:22:12.812036991 CEST6493853192.168.2.38.8.8.8
          Sep 15, 2021 13:22:12.853833914 CEST53649388.8.8.8192.168.2.3
          Sep 15, 2021 13:22:20.757668018 CEST6015253192.168.2.38.8.8.8
          Sep 15, 2021 13:22:20.787748098 CEST53601528.8.8.8192.168.2.3
          Sep 15, 2021 13:22:24.241019964 CEST5754453192.168.2.38.8.8.8
          Sep 15, 2021 13:22:24.282948971 CEST53575448.8.8.8192.168.2.3
          Sep 15, 2021 13:22:27.901772022 CEST5598453192.168.2.38.8.8.8
          Sep 15, 2021 13:22:27.938934088 CEST53559848.8.8.8192.168.2.3
          Sep 15, 2021 13:22:28.996938944 CEST6418553192.168.2.38.8.8.8
          Sep 15, 2021 13:22:29.033538103 CEST53641858.8.8.8192.168.2.3
          Sep 15, 2021 13:22:34.624207973 CEST6511053192.168.2.38.8.8.8
          Sep 15, 2021 13:22:34.652919054 CEST53651108.8.8.8192.168.2.3
          Sep 15, 2021 13:22:42.201474905 CEST5836153192.168.2.38.8.8.8
          Sep 15, 2021 13:22:42.233206034 CEST53583618.8.8.8192.168.2.3
          Sep 15, 2021 13:22:49.108741999 CEST6349253192.168.2.38.8.8.8
          Sep 15, 2021 13:22:49.136770010 CEST53634928.8.8.8192.168.2.3
          Sep 15, 2021 13:22:54.068249941 CEST6083153192.168.2.38.8.8.8
          Sep 15, 2021 13:22:54.106496096 CEST53608318.8.8.8192.168.2.3
          Sep 15, 2021 13:22:55.955784082 CEST6010053192.168.2.38.8.8.8
          Sep 15, 2021 13:22:55.983608007 CEST53601008.8.8.8192.168.2.3
          Sep 15, 2021 13:23:02.126761913 CEST5319553192.168.2.38.8.8.8
          Sep 15, 2021 13:23:02.127106905 CEST5014153192.168.2.38.8.8.8
          Sep 15, 2021 13:23:02.161456108 CEST53501418.8.8.8192.168.2.3
          Sep 15, 2021 13:23:02.163528919 CEST53531958.8.8.8192.168.2.3
          Sep 15, 2021 13:23:04.145071030 CEST5302353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:04.174401045 CEST53530238.8.8.8192.168.2.3
          Sep 15, 2021 13:23:04.848917961 CEST4956353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:04.879153013 CEST53495638.8.8.8192.168.2.3
          Sep 15, 2021 13:23:08.987534046 CEST5135253192.168.2.38.8.8.8
          Sep 15, 2021 13:23:09.019470930 CEST53513528.8.8.8192.168.2.3
          Sep 15, 2021 13:23:10.264875889 CEST5934953192.168.2.38.8.8.8
          Sep 15, 2021 13:23:10.294888973 CEST53593498.8.8.8192.168.2.3
          Sep 15, 2021 13:23:16.324917078 CEST5708453192.168.2.38.8.8.8
          Sep 15, 2021 13:23:16.351373911 CEST53570848.8.8.8192.168.2.3
          Sep 15, 2021 13:23:24.390568972 CEST5882353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:24.417530060 CEST53588238.8.8.8192.168.2.3
          Sep 15, 2021 13:23:31.457323074 CEST5756853192.168.2.38.8.8.8
          Sep 15, 2021 13:23:31.488898039 CEST53575688.8.8.8192.168.2.3
          Sep 15, 2021 13:23:37.994369030 CEST5054053192.168.2.38.8.8.8
          Sep 15, 2021 13:23:38.022464991 CEST53505408.8.8.8192.168.2.3
          Sep 15, 2021 13:23:40.911014080 CEST5436653192.168.2.38.8.8.8
          Sep 15, 2021 13:23:40.951396942 CEST53543668.8.8.8192.168.2.3
          Sep 15, 2021 13:23:43.463290930 CEST5303453192.168.2.38.8.8.8
          Sep 15, 2021 13:23:43.507141113 CEST53530348.8.8.8192.168.2.3
          Sep 15, 2021 13:23:44.690823078 CEST5776253192.168.2.38.8.8.8
          Sep 15, 2021 13:23:44.720443964 CEST53577628.8.8.8192.168.2.3
          Sep 15, 2021 13:23:51.904139042 CEST5543553192.168.2.38.8.8.8
          Sep 15, 2021 13:23:52.013540983 CEST53554358.8.8.8192.168.2.3
          Sep 15, 2021 13:23:58.869739056 CEST5071353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:58.897445917 CEST53507138.8.8.8192.168.2.3
          Sep 15, 2021 13:24:05.792474985 CEST5613253192.168.2.38.8.8.8
          Sep 15, 2021 13:24:05.822530031 CEST53561328.8.8.8192.168.2.3

          DNS Queries

          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Sep 15, 2021 13:22:12.812036991 CEST192.168.2.38.8.8.80xb3d1Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:20.757668018 CEST192.168.2.38.8.8.80x48f3Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:27.901772022 CEST192.168.2.38.8.8.80x84c1Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:34.624207973 CEST192.168.2.38.8.8.80xecdbStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:42.201474905 CEST192.168.2.38.8.8.80x1fe0Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:49.108741999 CEST192.168.2.38.8.8.80xadccStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:55.955784082 CEST192.168.2.38.8.8.80x159Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:04.145071030 CEST192.168.2.38.8.8.80x377fStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:10.264875889 CEST192.168.2.38.8.8.80x38caStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:16.324917078 CEST192.168.2.38.8.8.80x740fStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:24.390568972 CEST192.168.2.38.8.8.80x5a7cStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:31.457323074 CEST192.168.2.38.8.8.80xd144Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:37.994369030 CEST192.168.2.38.8.8.80xb6b4Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:44.690823078 CEST192.168.2.38.8.8.80xd875Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:51.904139042 CEST192.168.2.38.8.8.80x45efStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:58.869739056 CEST192.168.2.38.8.8.80xc018Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:24:05.792474985 CEST192.168.2.38.8.8.80xa801Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)

          DNS Answers

          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Sep 15, 2021 13:22:12.853833914 CEST8.8.8.8192.168.2.30xb3d1No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:20.787748098 CEST8.8.8.8192.168.2.30x48f3No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:27.938934088 CEST8.8.8.8192.168.2.30x84c1No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:34.652919054 CEST8.8.8.8192.168.2.30xecdbNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:42.233206034 CEST8.8.8.8192.168.2.30x1fe0No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:49.136770010 CEST8.8.8.8192.168.2.30xadccNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:55.983608007 CEST8.8.8.8192.168.2.30x159No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:04.174401045 CEST8.8.8.8192.168.2.30x377fNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:10.294888973 CEST8.8.8.8192.168.2.30x38caNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:16.351373911 CEST8.8.8.8192.168.2.30x740fNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:24.417530060 CEST8.8.8.8192.168.2.30x5a7cNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:31.488898039 CEST8.8.8.8192.168.2.30xd144No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:38.022464991 CEST8.8.8.8192.168.2.30xb6b4No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:44.720443964 CEST8.8.8.8192.168.2.30xd875No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:52.013540983 CEST8.8.8.8192.168.2.30x45efNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:58.897445917 CEST8.8.8.8192.168.2.30xc018No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:24:05.822530031 CEST8.8.8.8192.168.2.30xa801No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)

          Code Manipulations

          Statistics

          CPU Usage

          Click to jump to process

          Memory Usage

          Click to jump to process

          High Level Behavior Distribution

          Click to dive into process behavior distribution

          Behavior

          Click to jump to process

          System Behavior

          General

          Start time:13:22:01
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\user\Desktop\ALP.exe'
          Imagebase:0xfd0000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Reputation:low

          General

          Start time:13:22:06
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\ALP.exe
          Imagebase:0x770000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Reputation:low

          General

          Start time:13:22:08
          Start date:15/09/2021
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'
          Imagebase:0xf70000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:09
          Start date:15/09/2021
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6b2800000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:09
          Start date:15/09/2021
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'
          Imagebase:0xf70000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:10
          Start date:15/09/2021
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6b2800000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:10
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\ALP.exe 0
          Imagebase:0x190000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

          General

          Start time:13:22:13
          Start date:15/09/2021
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
          Imagebase:0x150000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, Author: Joe Security
          Antivirus matches:
          • Detection: 100%, Joe Sandbox ML
          • Detection: 30%, ReversingLabs

          General

          Start time:13:22:14
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\ALP.exe
          Imagebase:0x5e0000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

          General

          Start time:13:22:17
          Start date:15/09/2021
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Imagebase:0x9d0000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

          Disassembly

          Code Analysis

          Reset < >

            Executed Functions

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID: uM(
            • API String ID: 0-151466623
            • Opcode ID: 6ac4ee05fbd9888123a85f27047200102dafc3501f6aeb405efb72584c3c8274
            • Instruction ID: e8e308ef236e27bdb7f52a414162b80a61427cff7f77092c3f4cf07008e7a8d4
            • Opcode Fuzzy Hash: 6ac4ee05fbd9888123a85f27047200102dafc3501f6aeb405efb72584c3c8274
            • Instruction Fuzzy Hash: 05812871E44229CBDB28CF66C840BD9FBB6BB99301F14C5AAD50DA7614EB705AC5CF01
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID: uM(
            • API String ID: 0-151466623
            • Opcode ID: cb680595ceb903682d562068176626e38bad6df7168967f4a59a91e31e4d4bc1
            • Instruction ID: fc46e2837f280d2d93d7cb9ae29de18a3b39884777f47d05f3e564dc6e33f544
            • Opcode Fuzzy Hash: cb680595ceb903682d562068176626e38bad6df7168967f4a59a91e31e4d4bc1
            • Instruction Fuzzy Hash: EC711871E40629CBDB28CF6ACC40BD9FBB2BB99301F14C5AAD50DA7654EB705A85CF00
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID: uM(
            • API String ID: 0-151466623
            • Opcode ID: 796ecbca7e920a237416b293e0b50c7133dd6fe36cec0fb91a903ee7576255fc
            • Instruction ID: d66d14c3df3bfacd2a8bfcb2202064b50b06f778ca9d029be639c3ccb7694cfa
            • Opcode Fuzzy Hash: 796ecbca7e920a237416b293e0b50c7133dd6fe36cec0fb91a903ee7576255fc
            • Instruction Fuzzy Hash: 2A6114B5D4022ACBDB64CF65C880BD9F7B2BB99301F14C6EAD10AA7610EB705AC5CF41
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID: uM(
            • API String ID: 0-151466623
            • Opcode ID: bdfa430db0ffc514ed5283ecc56a366d101c8877bb19f250b594a79935e5a0ec
            • Instruction ID: 2a8b7987a69c8203582655d8f5faa7399ab25931db8f3c53e91c565a15abad85
            • Opcode Fuzzy Hash: bdfa430db0ffc514ed5283ecc56a366d101c8877bb19f250b594a79935e5a0ec
            • Instruction Fuzzy Hash: FE513775E4021ACBDB24CF65C880BD9F7B2BB99301F14C6A6D10EA7614EB705AC5CF00
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID: uM(
            • API String ID: 0-151466623
            • Opcode ID: a80f8bc33073b56fe2cc6b0ba12bfd80fb92e886268f22f8d980af5a0bc9ceaf
            • Instruction ID: 93967c9da827c6bda3e123e5abd8ad3e08af74b3ee80dd9412d70fcd6f56b5a7
            • Opcode Fuzzy Hash: a80f8bc33073b56fe2cc6b0ba12bfd80fb92e886268f22f8d980af5a0bc9ceaf
            • Instruction Fuzzy Hash: F8512675E4022ACBDB24CF65D880BE9F7B2FB99301F1486A6D10EA7640EB705AC5CF11
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID: uM(
            • API String ID: 0-151466623
            • Opcode ID: 4e4b7432560d3c24a347113dc23d5b2e224cabfb3f4e0be6511b2886e6a535ef
            • Instruction ID: 79f9da055892f36eaac2bb0113d44ff04b29721d17fe2398df11fa0add6210d5
            • Opcode Fuzzy Hash: 4e4b7432560d3c24a347113dc23d5b2e224cabfb3f4e0be6511b2886e6a535ef
            • Instruction Fuzzy Hash: FC513775E4021ACBDB24CF65C880BE9F7B2BB99301F14C6A6D10EA7600EB705AC58F00
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cbf8508eb3cfd58c937d0013c996d949e5da6b4490ee984bb83647c9dd984cd6
            • Instruction ID: 2e369924e62adfef79bbb9fc2487b24dd2295cbcc70b88ffdc1f58d18b7c2d0b
            • Opcode Fuzzy Hash: cbf8508eb3cfd58c937d0013c996d949e5da6b4490ee984bb83647c9dd984cd6
            • Instruction Fuzzy Hash: 97D1AC71B013018FEB29DB79C450BAEBBFAAF88601F14886DD249CB694DF35E901CB51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32 ref: 0336B6F0
            • GetCurrentThread.KERNEL32 ref: 0336B72D
            • GetCurrentProcess.KERNEL32 ref: 0336B76A
            • GetCurrentThreadId.KERNEL32 ref: 0336B7C3
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID:
            • API String ID: 2063062207-0
            • Opcode ID: d9a459b2c03a69185593b5d14523bb01d10ed4aec831da71000c59064a5f90fb
            • Instruction ID: 380a4890eac9533d3c1e771d37efd37ed1da2372b15ceaa05d0234d7f913155b
            • Opcode Fuzzy Hash: d9a459b2c03a69185593b5d14523bb01d10ed4aec831da71000c59064a5f90fb
            • Instruction Fuzzy Hash: 9C5152B49006498FDB10CFAAD988BDEFBF4BF48314F24856AE819A7350D7746984CF61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32 ref: 0336B6F0
            • GetCurrentThread.KERNEL32 ref: 0336B72D
            • GetCurrentProcess.KERNEL32 ref: 0336B76A
            • GetCurrentThreadId.KERNEL32 ref: 0336B7C3
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID:
            • API String ID: 2063062207-0
            • Opcode ID: a2b74f07943c1ce47e8dcc50c0753d06cae4972592759ddffd80a55df99eb28f
            • Instruction ID: e90495f3935490d9ae6251a88c6e0b7a401f37e062febf3b8a5964953682eef7
            • Opcode Fuzzy Hash: a2b74f07943c1ce47e8dcc50c0753d06cae4972592759ddffd80a55df99eb28f
            • Instruction Fuzzy Hash: 755142B49006498FDB10CFAAC988BDEFBF4BF48314F24856AE819A7350D7746984CF65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 019D205E
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: 6189f217f8dd9c55d744531447d641ae1f63d8977350e7bb602dbe64c7fae12b
            • Instruction ID: 0ad54c1297d2ebd402d156cb4e914269323a96e3459309cfeaac19513a4e569f
            • Opcode Fuzzy Hash: 6189f217f8dd9c55d744531447d641ae1f63d8977350e7bb602dbe64c7fae12b
            • Instruction Fuzzy Hash: 3DA15C71D00259CFEB21CFA8C8817EEBBB6FF48315F1485A9E909A7280D7749985CF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 019D205E
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: 81189cd53b97fe83373937fe34439811898da5f925624fe57c280cf12f8a8122
            • Instruction ID: 56aef4febc8081724745f4b4e285a205be7c083a83365a6321560b3df1c426f8
            • Opcode Fuzzy Hash: 81189cd53b97fe83373937fe34439811898da5f925624fe57c280cf12f8a8122
            • Instruction Fuzzy Hash: E7914B71D00219CFDB21CFA9C8817EEBBB6FF48315F1485A9E909A7240DB749985CF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0336FE0A
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: 214430d9fcce04b62c0cc680d808080d3d6da9a3762aa637c546396e2fac9dc2
            • Instruction ID: 207b6c357c44fade70d663cb1de179469a1e8b1c0b8fcdd1db02e560872b3ab0
            • Opcode Fuzzy Hash: 214430d9fcce04b62c0cc680d808080d3d6da9a3762aa637c546396e2fac9dc2
            • Instruction Fuzzy Hash: A75120B1C00249AFCF11CFA9C880ACEBFB1FF49300F64816AE818AB221D3319855CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0336FE0A
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: d40ce5e1dac9adbfd206d3198d41894ab370ab4fe24b49849535aecf9e2ff373
            • Instruction ID: ba30fef0b227886c79a1248ffb4a8b6219b375e13777f6774d1755f37e156dfe
            • Opcode Fuzzy Hash: d40ce5e1dac9adbfd206d3198d41894ab370ab4fe24b49849535aecf9e2ff373
            • Instruction Fuzzy Hash: 3441CEB1D003099FDB14CFA9D884ADEBFB5FF48314F64812AE819AB215D774A985CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 03365421
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: f919b1f94230c68d6a106f8ed86f6ea1d878f71a81fe16555c97e36fb0c53777
            • Instruction ID: 3ddf45c8144958df4121d2892fd5e524a92e2fb3c516f4064a3ef9d7f543b901
            • Opcode Fuzzy Hash: f919b1f94230c68d6a106f8ed86f6ea1d878f71a81fe16555c97e36fb0c53777
            • Instruction Fuzzy Hash: DD411271C00619CFDB24DFAAC8847CEBBB5FF49308F24846AD408AB251E7756989CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 03365421
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: 41f3fb7b1cc6621a72419c3d7f649534e05d562021a424673bb9be9fb58ec923
            • Instruction ID: 4824a7f16892b4f102b82178bb2c7861aea910ca5fc66b5310ac7d2dadc4e9ac
            • Opcode Fuzzy Hash: 41f3fb7b1cc6621a72419c3d7f649534e05d562021a424673bb9be9fb58ec923
            • Instruction Fuzzy Hash: DA410271C04618CFDB24DFAAC8847CEBBB5BF49304F648469D408AB255E7756989CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 019D1C30
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: 45cd0475a46b1c6e4ca057f4914c6d387bcd605f9ba3a5c4fa58b08d4b5561b8
            • Instruction ID: ee92a0f929f4f1c40de24611721d70bc160c408e929ce3eb1905b96bd21d7443
            • Opcode Fuzzy Hash: 45cd0475a46b1c6e4ca057f4914c6d387bcd605f9ba3a5c4fa58b08d4b5561b8
            • Instruction Fuzzy Hash: 3A212672D003499FCB10CFA9C8857EEBBF5FF48314F50882AE919A7240D7789954CBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 019D1C30
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: af848d58ad432392cc66104a31089d791e23932071149fe30735c6309a62fccc
            • Instruction ID: b236e708c5e0f6a61f1dc451e672bbb84055aaaa7e0c996f5184ca6ef08a4f06
            • Opcode Fuzzy Hash: af848d58ad432392cc66104a31089d791e23932071149fe30735c6309a62fccc
            • Instruction Fuzzy Hash: 2B2115B2D003599FCF10CFA9C8847EEBBF5FB48314F508429E919A7240D7789954CBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 019D4A85
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: 85c9b8dd5ecf6cdb1a2b13638924e2e4146721cabafe19c4f9f8e4aa6d56481c
            • Instruction ID: cec315ad576e29abf032a8e8a4e0b3fde47e18a2fda0dc70e11df2949c165ded
            • Opcode Fuzzy Hash: 85c9b8dd5ecf6cdb1a2b13638924e2e4146721cabafe19c4f9f8e4aa6d56481c
            • Instruction Fuzzy Hash: B1215CB68003489FDB10CF99D485BDEFFF8EB48324F24841AD519A3601C375A554CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 019D1D10
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 1c2045dfa5f00e24151a9271fe3b0a23f3e874b519db8c66d7c965d0fe2cc7cf
            • Instruction ID: fea31484740a7f30fe1ace956ad9e4ac6cc49cf45ccde65cdf509f7895261b1c
            • Opcode Fuzzy Hash: 1c2045dfa5f00e24151a9271fe3b0a23f3e874b519db8c66d7c965d0fe2cc7cf
            • Instruction Fuzzy Hash: D32136B1D003499FDB10DFA9C8847EEBBF5FF48314F50882AE929A7240D7789954DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 019D1A86
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: 9d77c633f85f4ffedd9327ef557f8cb0a251fe5d01df987517e89a5ea2c682c0
            • Instruction ID: 6a0f27805c788efffaf9a59f2e1f34d50387e184a2e2eda79ad416fb1d249410
            • Opcode Fuzzy Hash: 9d77c633f85f4ffedd9327ef557f8cb0a251fe5d01df987517e89a5ea2c682c0
            • Instruction Fuzzy Hash: 8E216872D003488FDB10DFA9C4847EEBBF4EF48324F54842AD919A7241DB789945CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 019D1D10
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: b4447083a02d2cfabed4ab11aa375fa010749b8e3ab10aa768d61921893c782f
            • Instruction ID: a82aaa54c946df34e6f3502c9dd696233e990d4bf18660dcaeae301b82976324
            • Opcode Fuzzy Hash: b4447083a02d2cfabed4ab11aa375fa010749b8e3ab10aa768d61921893c782f
            • Instruction Fuzzy Hash: B62128B1C003499FCF10DFA9C8846EEBBF5FF48314F508429E919A7240D7749950DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 019D1A86
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: c054eb67e9388ebca464fd01740a88caf14fff99283bedaf6e2dad17418ec4a1
            • Instruction ID: c62d7df8e983fdfd7020d90298e306e15debd8bff5666d40c4308b8b9d96093a
            • Opcode Fuzzy Hash: c054eb67e9388ebca464fd01740a88caf14fff99283bedaf6e2dad17418ec4a1
            • Instruction Fuzzy Hash: C1212972D003498FDB10DFA9C4847EEBBF8EF48264F54842AD519A7241DB78A945CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0336B93F
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: a7eab0c1f84a614a07f3721e8b98d200021ac96d3838673bb9c4641ccd46fcaa
            • Instruction ID: 898a8461b841862fe29fd6e79ce189b1bb9c059b2f4dc543c0714048bdca1b1d
            • Opcode Fuzzy Hash: a7eab0c1f84a614a07f3721e8b98d200021ac96d3838673bb9c4641ccd46fcaa
            • Instruction Fuzzy Hash: 4421C4B5900259AFDB10CFAAD984ADEFFF8EB48324F14841AE914A3310D374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0336B93F
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: b3b7a8cfbb37b8bccea46d0a605653a9476149e7beb6c3d7d5861a85665a1502
            • Instruction ID: b0aa727f923dd73d03d572318196353a601b42ef00438d350f24cd4ed0dd05ae
            • Opcode Fuzzy Hash: b3b7a8cfbb37b8bccea46d0a605653a9476149e7beb6c3d7d5861a85665a1502
            • Instruction Fuzzy Hash: 8021C2B5900259AFDB10CFAAD884ADEFBF8EB48324F14841AE914A3310D374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,03369951,00000800,00000000,00000000), ref: 03369B62
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: d657ffa6c57d5539581e79b21afc1ba85c759ec55fe22484524cb0c0a0c7e094
            • Instruction ID: 7f8f5e33c785f4eacc2c01f86d40a12ef754c8be822b926b67e777a5c04f0687
            • Opcode Fuzzy Hash: d657ffa6c57d5539581e79b21afc1ba85c759ec55fe22484524cb0c0a0c7e094
            • Instruction Fuzzy Hash: FD1106B69002499FCB10CF9AC884BDEFBF8EB48310F14852ED515A7600C374A945CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 019D1B4E
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: cce5c5a25cf12dbf520ecfe2a7f6fe2f2fa8f5ef4ea718427bce79d812a4ca00
            • Instruction ID: 31bcf5b0b8fd1b5f01820c89f2d3c326f025d34ffdc1e4692d86432ec7b6b7a9
            • Opcode Fuzzy Hash: cce5c5a25cf12dbf520ecfe2a7f6fe2f2fa8f5ef4ea718427bce79d812a4ca00
            • Instruction Fuzzy Hash: CB1159729002498FDF10CFA9C844BDFBBF5EF48314F14881AE529A7210D7759950CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 019D1B4E
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 42858c403d523c38e2a08bf49cdd86bfab37b8827b7fc201d5be6aeb6029d9e1
            • Instruction ID: 325e507a3fe606e99cc340325c813ee94666dc59352c0ffe254570377c982e8b
            • Opcode Fuzzy Hash: 42858c403d523c38e2a08bf49cdd86bfab37b8827b7fc201d5be6aeb6029d9e1
            • Instruction Fuzzy Hash: 3D1107729002499FDF10DFA9C844BEFBBF9EF48324F148829D529A7250D7759954CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: ea86ff13956c9518ead12b0f8f206a177085f02b72c96bbf91e4223f261db3f6
            • Instruction ID: a8e44ebe55662ec2ad41c99a816007b7ad8a10b243a5b4ffcb40afdf3cc5fd9a
            • Opcode Fuzzy Hash: ea86ff13956c9518ead12b0f8f206a177085f02b72c96bbf91e4223f261db3f6
            • Instruction Fuzzy Hash: C9115B71D006488FDB10DFAAD8447EFFBF4AB48224F148829D529A7640D7759945CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,03369951,00000800,00000000,00000000), ref: 03369B62
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 879aa5c78f0d1252cf9a9a4de40c7b28bbd0df3a695ed4021613a8d3bd34214e
            • Instruction ID: 144264d09ec68972d0d33d6d6e8e249f19d8b0907e41b5b99abea6b9fff02588
            • Opcode Fuzzy Hash: 879aa5c78f0d1252cf9a9a4de40c7b28bbd0df3a695ed4021613a8d3bd34214e
            • Instruction Fuzzy Hash: 8311DDB6D002498FDB10CFAAC888BDEFBF8AB48324F14852ED519A7600C375A555CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: 6928eaa0c2b0935ae7c3068c2f318dfb1aa28d7032a64aa495570e5b571e1a95
            • Instruction ID: 4f38cd683ae0a721245811be04c77aa147f79d3bc9c0e6bdd121ef0aaf38dd15
            • Opcode Fuzzy Hash: 6928eaa0c2b0935ae7c3068c2f318dfb1aa28d7032a64aa495570e5b571e1a95
            • Instruction Fuzzy Hash: 87110AB1D003488FDB10DFAAD4447EFFBF9EB48224F148829D529A7640D775A945CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindCloseChangeNotification.KERNELBASE(?), ref: 019D5468
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: ChangeCloseFindNotification
            • String ID:
            • API String ID: 2591292051-0
            • Opcode ID: eba516687167ee00210ff654bdf9116145aacaa96b59edcf81f30ab9929d42e2
            • Instruction ID: 0c2fe982c4b9c2cc2a54100f7a1803ac54ef42ee4d06d97c9afae55f2d11d32f
            • Opcode Fuzzy Hash: eba516687167ee00210ff654bdf9116145aacaa96b59edcf81f30ab9929d42e2
            • Instruction Fuzzy Hash: B01148B28007098FDB10CF99C485BDEFBF4EB48324F148429D958A7740D778A544CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindCloseChangeNotification.KERNELBASE(?), ref: 019D5468
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: ChangeCloseFindNotification
            • String ID:
            • API String ID: 2591292051-0
            • Opcode ID: 00f28b1a01e350ee5516e7de87265751cfa734151960e5fe843f3cc51fd2b351
            • Instruction ID: 5f88c76fe11d66578c18f8e03eca32a962a9f9b9192fec593d98d09ca5cbd916
            • Opcode Fuzzy Hash: 00f28b1a01e350ee5516e7de87265751cfa734151960e5fe843f3cc51fd2b351
            • Instruction Fuzzy Hash: 9E1148B18007098FDB10CF99C444BDEBBF4EB48320F148429D558A7740D378A544CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 033698D6
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: c46dc183e4f84b4b6b5863226249ffab50f92e017edab4713433516ad920e64a
            • Instruction ID: b89e59afd0f009d7c9e5fe3151f79e9efaa8971a1d94ad4821703c1b5241572a
            • Opcode Fuzzy Hash: c46dc183e4f84b4b6b5863226249ffab50f92e017edab4713433516ad920e64a
            • Instruction Fuzzy Hash: A911E3B6C006498FDB10CF9AD484BDEFBF4EB49324F14852AD429B7600D375A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 033698D6
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: b42d21054e218d128f1dc3aa0afdae2dc8ee81386f1df3a8b99f21e2c461772e
            • Instruction ID: 7cf14908e105f3af1375d0101418f6b99ad06f63b7d6eeda878d3423ea3c4775
            • Opcode Fuzzy Hash: b42d21054e218d128f1dc3aa0afdae2dc8ee81386f1df3a8b99f21e2c461772e
            • Instruction Fuzzy Hash: 2811FDB6C006098FDB10CF9AC488BDEFBF4EF48224F14852AC429B7604D375A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 019D4A85
            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: ee362a8c9a24eea98f602e398d1896f2e4377f471c6f12ac8b798c34303b9892
            • Instruction ID: 06d492ba15a8cedc6fd5e1141bfc5bc89da2dc39de396c214c98c34e6260a734
            • Opcode Fuzzy Hash: ee362a8c9a24eea98f602e398d1896f2e4377f471c6f12ac8b798c34303b9892
            • Instruction Fuzzy Hash: 0D11D0B58003499FDB10CF99C889BDEBBF8EB48324F54841AE919A7600D375A994CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 0336FF9D
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: e646c06a447297894fcb48d6d09d825e809b7c4055292fb0bac7eaef86310b25
            • Instruction ID: 5c8d3a5f520363c90d8b95b85d3b994e8d8b0bfabea367195c3607d6554ffe7b
            • Opcode Fuzzy Hash: e646c06a447297894fcb48d6d09d825e809b7c4055292fb0bac7eaef86310b25
            • Instruction Fuzzy Hash: 481103B58006098FDB10CF99D589BDEFBF8EB48324F14851AD919B7740D374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 0336FF9D
            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: 79b672455d596a00a8a7052985a5c6bcb23e145e45422507374217032fa263a2
            • Instruction ID: bb3aa0de0afdaa4e4c4882fa4c571b9f971a0ddafebb18400006a3b2117253fd
            • Opcode Fuzzy Hash: 79b672455d596a00a8a7052985a5c6bcb23e145e45422507374217032fa263a2
            • Instruction Fuzzy Hash: D41112B58002089FDB10CF99D489BDEFBF8EB48324F24851AE919A7340C374A944CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234837580.00000000015BD000.00000040.00000001.sdmp, Offset: 015BD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b92bffa229c1e4b3d30427260e2a780646dd515db2e3a11dc46d11368b33b8ed
            • Instruction ID: b7ce55571a3db0035085a8224952b360dcdb648ca95d3ca1b6b3b37e8a6cc47d
            • Opcode Fuzzy Hash: b92bffa229c1e4b3d30427260e2a780646dd515db2e3a11dc46d11368b33b8ed
            • Instruction Fuzzy Hash: 2A21F871504244DFDB05DF94D9C4BDABBB5FB88328F24C969D8090F246C37AE856CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234943714.000000000193D000.00000040.00000001.sdmp, Offset: 0193D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c1c8a3d13b984669accba9e9ddf4b648e3c6864baa0f07473d6dc87b72edb357
            • Instruction ID: d50b030e203e0396153cffc050d94ef1e297cfb486b1148455e5330240304205
            • Opcode Fuzzy Hash: c1c8a3d13b984669accba9e9ddf4b648e3c6864baa0f07473d6dc87b72edb357
            • Instruction Fuzzy Hash: E121F271504200EFDB05DF94D9D0F26BBA9FBC8324F64C969E80D4B242C736D856CA61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234943714.000000000193D000.00000040.00000001.sdmp, Offset: 0193D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 500e979b5b8fad55c2af01b27103b527bd49166c33401661f27dca78ed8f9d84
            • Instruction ID: 81cf3877c0bf4d56445bbefd2509a12c8ceafed54a5bc93bb657f516247a0b70
            • Opcode Fuzzy Hash: 500e979b5b8fad55c2af01b27103b527bd49166c33401661f27dca78ed8f9d84
            • Instruction Fuzzy Hash: E9212271504200DFDB11CFA4D8D4F26FBA9FBC8B64F64C969E80E0B246C33AD846CA61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234943714.000000000193D000.00000040.00000001.sdmp, Offset: 0193D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 268a91d5670f9b1ce46da03550d5434ee2cff9c17dfc89444cc140e2f1c5972c
            • Instruction ID: 431549781620cc687693f21a4e25bbfe5fb3abbeee8b7e297ed07f189f63c8eb
            • Opcode Fuzzy Hash: 268a91d5670f9b1ce46da03550d5434ee2cff9c17dfc89444cc140e2f1c5972c
            • Instruction Fuzzy Hash: C82183755093808FCB03CF64D594715BFB1EB46614F28C5EAD8498F657C33AD84ACB62
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234837580.00000000015BD000.00000040.00000001.sdmp, Offset: 015BD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f56c5d28dc22c36c06b9c0244b20b8a5410b3a40b9b7180f2002089e4cc55e97
            • Instruction ID: 274b771673f66c3202dd1a1ebc1b8ac84e2ed3529caf0ceeb77d39f065294cb8
            • Opcode Fuzzy Hash: f56c5d28dc22c36c06b9c0244b20b8a5410b3a40b9b7180f2002089e4cc55e97
            • Instruction Fuzzy Hash: 4411B176404280DFDB12CF54D5C4B9ABF71FB84324F24C6A9D8090F656C37AE45ACBA2
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234943714.000000000193D000.00000040.00000001.sdmp, Offset: 0193D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction ID: c4b69dff169e2defa911fc68f73237ae9278004df5b9ada7ef610b974d174baa
            • Opcode Fuzzy Hash: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction Fuzzy Hash: 2611B875904280DFDB02CF54C5D4B15BBA2FB84224F28C6AAD8494B696C33AD85ACB62
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234837580.00000000015BD000.00000040.00000001.sdmp, Offset: 015BD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 171122f083cac2f137124bdfdbdb6857173c051806b8569082bead4c97edffd5
            • Instruction ID: 34d0b14fca6039d6d33c99b0c95aaa1b2655f7c9b1c891750471705639b80b6c
            • Opcode Fuzzy Hash: 171122f083cac2f137124bdfdbdb6857173c051806b8569082bead4c97edffd5
            • Instruction Fuzzy Hash: 5A0188714042849AE7114B95CDC4BEBBFECEF41268F18895AE9055E246D3799844C6B1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.234837580.00000000015BD000.00000040.00000001.sdmp, Offset: 015BD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a46acc393f573f0d3f210ea6a9e86fb2db32061a8610d9ff5ae32170ddfffbd6
            • Instruction ID: 1a7db6362bc476f4532886b842738660852e49e9ae08e0b0cfe9449270753051
            • Opcode Fuzzy Hash: a46acc393f573f0d3f210ea6a9e86fb2db32061a8610d9ff5ae32170ddfffbd6
            • Instruction Fuzzy Hash: 5EF068714042849FEB118F59DCC8BE6FFA8EB41674F18C45AED045F286D3799844CAB1
            Uniqueness

            Uniqueness Score: -1.00%

            Non-executed Functions

            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 551006ce5b0fe8b6a0c52e6e1cf0cdf5d799494cd820d48bdf75ec1be23d56ba
            • Instruction ID: f178fd69d4f6dcac6ea1923d4e0b9b67bf8f86e2344538f03cad90dcbf3cc52f
            • Opcode Fuzzy Hash: 551006ce5b0fe8b6a0c52e6e1cf0cdf5d799494cd820d48bdf75ec1be23d56ba
            • Instruction Fuzzy Hash: F112D3F54117468BF712EF69E8C81C93BA8F756328F904308D2626FAD9D7B8154ACF84
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 09788b7f11b5b44d64d770891551a4eacfa180b4e692b33910213844126754f9
            • Instruction ID: 3a717194143af6cd8fb3c202a5a7f86da4f9bc442cd5192567e46443872b796a
            • Opcode Fuzzy Hash: 09788b7f11b5b44d64d770891551a4eacfa180b4e692b33910213844126754f9
            • Instruction Fuzzy Hash: 81A16D36E0021A8FCF15DFA5C8845DEBBF6FF85300B15856AE805AB265EB31E915CB80
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e9b8aa8da434557003fcc877a5c78d231175d5593793477fcf175628b0f5b35e
            • Instruction ID: c96e99bab10cdc8df099ff065cd579ab33600ab3b441c2acdc7a0e89860c9380
            • Opcode Fuzzy Hash: e9b8aa8da434557003fcc877a5c78d231175d5593793477fcf175628b0f5b35e
            • Instruction Fuzzy Hash: 10916E31E002158BDB14CF9DC945AADBBFAFF88215F29C169E51CAB252D731DC42CB91
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.235507794.0000000003360000.00000040.00000001.sdmp, Offset: 03360000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f03c3f180d009172e27d90d8bfe53adb5113ccb485a78351b50d603e830c558b
            • Instruction ID: c717feec8cde60b7ad5cfe556ad909764c042017d9f3567f97d8540ae74d8c0f
            • Opcode Fuzzy Hash: f03c3f180d009172e27d90d8bfe53adb5113ccb485a78351b50d603e830c558b
            • Instruction Fuzzy Hash: FCC14AB1811746CBF712EF65E8C81C97BB9FB86328F614308D2616B6D8D7B8154ACF84
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ae0f1d9973c91cc88d031b6671b0822d6e5baac67e536a2d514be5c95376bedd
            • Instruction ID: 4b7f7036f7f293689baa3c8c851fc0204f9eed1a69f27954c0f2184ad6c51ee2
            • Opcode Fuzzy Hash: ae0f1d9973c91cc88d031b6671b0822d6e5baac67e536a2d514be5c95376bedd
            • Instruction Fuzzy Hash: 07711974E1520A8BCB04CFA5D5418AEFBF2EF99310F20D42AD519F7354D734AA428FA5
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.235289840.00000000019D0000.00000040.00000001.sdmp, Offset: 019D0000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4afa8ebc7c7ba7573bb5f140f033282d82bd6fa6d8a4bf2d1b3168afc3d1bd60
            • Instruction ID: 57e73c1e55c8ccf98a7d789736b46c1c7af8b486af4e1fa09212c280eea0bb41
            • Opcode Fuzzy Hash: 4afa8ebc7c7ba7573bb5f140f033282d82bd6fa6d8a4bf2d1b3168afc3d1bd60
            • Instruction Fuzzy Hash: 8C710774E1520A8BCB04CFA9D5419AEFBF2EF89300F20D42AD519F7354D734AA468FA5
            Uniqueness

            Uniqueness Score: -1.00%

            Executed Functions

            APIs
            • GetCurrentProcess.KERNEL32 ref: 022FB6F0
            • GetCurrentThread.KERNEL32 ref: 022FB72D
            • GetCurrentProcess.KERNEL32 ref: 022FB76A
            • GetCurrentThreadId.KERNEL32 ref: 022FB7C3
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID:
            • API String ID: 2063062207-0
            • Opcode ID: cb88998105067cbe25b59b6fef811ac3b1a68e982042e19b9771a4265eb1f512
            • Instruction ID: af2a80fad619adff6281a88665e8c9260463890c1ad93fb10c317c0600f86c04
            • Opcode Fuzzy Hash: cb88998105067cbe25b59b6fef811ac3b1a68e982042e19b9771a4265eb1f512
            • Instruction Fuzzy Hash: 315154B4900649CFDB50CFA9D688BEEBBF1FF48318F248569E419A7250D738A944CF25
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32 ref: 022FB6F0
            • GetCurrentThread.KERNEL32 ref: 022FB72D
            • GetCurrentProcess.KERNEL32 ref: 022FB76A
            • GetCurrentThreadId.KERNEL32 ref: 022FB7C3
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID:
            • API String ID: 2063062207-0
            • Opcode ID: 11fea4271eb3a44234bc3c381778c96b6e5f8d43769d53068c074c36aef279b0
            • Instruction ID: 7e87abf530c369c0bbb4f58d47d2d0704c6d082d740249f656df9c3d454d78d6
            • Opcode Fuzzy Hash: 11fea4271eb3a44234bc3c381778c96b6e5f8d43769d53068c074c36aef279b0
            • Instruction Fuzzy Hash: 515166B0900649CFDB54CFA9C688BEEBBF4FF48318F208569E419A7250D738A944CF61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0451205E
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: f68117cbf96ff54c5e476b8b27fb691752f625e0b033ae8b5f1bba520f2f7fe4
            • Instruction ID: 4087776a70c81e9d8816ef551ccdc5c90ede97c73edd83b3bfa00934c983c974
            • Opcode Fuzzy Hash: f68117cbf96ff54c5e476b8b27fb691752f625e0b033ae8b5f1bba520f2f7fe4
            • Instruction Fuzzy Hash: DFA16D71D00619DFEF20CFA4D8807DEBBB2BF48314F1485A9E909A7290DB749985DF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0451205E
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: f10b9f5e624b2286816b1dce99a223762e94f28f5fbcf3c9234db53f5765c377
            • Instruction ID: 780b5eaf9d0c7db11835425122a7ebda297ecaa0363d7ec593043daeb2e921a7
            • Opcode Fuzzy Hash: f10b9f5e624b2286816b1dce99a223762e94f28f5fbcf3c9234db53f5765c377
            • Instruction Fuzzy Hash: 23916C71D00619DFEF20CFA5D8807DEBBB2BF48314F1485A9E909A7290DB74A981DF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 022FFE0A
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: 805337fc1e7255bf798e639bfdff410943d0685cd6b62453b2b688fab332fde2
            • Instruction ID: 8bd9fab5dd24cb275c28e42ed6febbe4270c92c592e2d3fbcf4904f45c8ac70c
            • Opcode Fuzzy Hash: 805337fc1e7255bf798e639bfdff410943d0685cd6b62453b2b688fab332fde2
            • Instruction Fuzzy Hash: 1051EDB1D10209DFDB14CFE9C984ADEFBB1BF88314F24812AE918AB254D7709885CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 022FFE0A
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: d2791d8db0b60205e6da055b0e5d9bd5629634dc16ace91937dacbffdca207dc
            • Instruction ID: 5877e2094ddc2cb723cbf8d899fe41de9a32ef554cf61a894ba8806afa2f1204
            • Opcode Fuzzy Hash: d2791d8db0b60205e6da055b0e5d9bd5629634dc16ace91937dacbffdca207dc
            • Instruction Fuzzy Hash: 7541DFB1D103099FDB14CFE9C984ADEFBB5BF48314F24812AE919AB254D7709985CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 022F5421
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: d612b6e04f8660f232498feea85c6126a35bd8b056cfd92818d94eb8b76daa1c
            • Instruction ID: dfc7af3afc6ad6d9a6199591211a90b551d713ac70219153f04cd17ed22276fc
            • Opcode Fuzzy Hash: d612b6e04f8660f232498feea85c6126a35bd8b056cfd92818d94eb8b76daa1c
            • Instruction Fuzzy Hash: 8041D171C00619CFDB24DFA9C984BCEBBB5BF48308F208469D508BB255D7756986CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 022F5421
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: 3408b32c4b3ac564242840244dfd3a4b4dfdf85b2170d42bc66b613f6ac3199d
            • Instruction ID: f51fa061e97a83c2c642c02b074e4f7019c56d54645b83d3885d314903bd3523
            • Opcode Fuzzy Hash: 3408b32c4b3ac564242840244dfd3a4b4dfdf85b2170d42bc66b613f6ac3199d
            • Instruction Fuzzy Hash: 0E41F170C00629CBDB24DFE9C984BCEBBB5BF48308F608469D508BB255D7756945CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemMetrics.USER32(0000004B), ref: 022F7DFD
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: MetricsSystem
            • String ID:
            • API String ID: 4116985748-0
            • Opcode ID: 2ac5783434c26044f536033349e19e1172720a7881b6fa19c0e7d2a76e4aa634
            • Instruction ID: 86b620154c212c41edca2badd3c06822d5644660a56887e20c6cf5768e0406c3
            • Opcode Fuzzy Hash: 2ac5783434c26044f536033349e19e1172720a7881b6fa19c0e7d2a76e4aa634
            • Instruction Fuzzy Hash: 2D3122B6A00386CEDB11CFA9E5443EABFF8EB44308F48486ED544A7281D7389955CF60
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04511C30
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: a32262b5ce79fc87cbb3f4ba9147f7b66aa4538ddb7e9d7cab55ca925a4394f6
            • Instruction ID: acbc683d61d583bd0435bfc8f11b0ee5c53641606f49f35b12b04f4b595dabb0
            • Opcode Fuzzy Hash: a32262b5ce79fc87cbb3f4ba9147f7b66aa4538ddb7e9d7cab55ca925a4394f6
            • Instruction Fuzzy Hash: BA2137B19003599FDF10CFA9C8847EEBBF5FF48314F148429E919A7650D7789951CBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04511C30
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: c85f49ec9b8eebdcbdc2906d305fc0d5a3ad62fb35f698c286aa416d1fedcd7b
            • Instruction ID: dfeadc93e94a337466d397029a220bde4b06d438e526a1a527d47beeba760c97
            • Opcode Fuzzy Hash: c85f49ec9b8eebdcbdc2906d305fc0d5a3ad62fb35f698c286aa416d1fedcd7b
            • Instruction Fuzzy Hash: A12126B19003599FDF10CFA9C884BEEBBF5FF48314F148429E919A7250D778A954DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04511D10
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 25ccbffc198dbb3bca9d17e3107dbf70825a1c1985fd9621614da5f855b9f25f
            • Instruction ID: b884016023c84c924c07094d86bafb63afe89827d834ec199bd692ab8c96e551
            • Opcode Fuzzy Hash: 25ccbffc198dbb3bca9d17e3107dbf70825a1c1985fd9621614da5f855b9f25f
            • Instruction Fuzzy Hash: 5D2136B18002499FDF10CFA9C8846EEBBF5FF48314F10882AE929A7250D7399955DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 04511A86
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: 8abf3e8190de730396f286d91f5e2a7ed4eb175cdf0e41ad0ddcc9f30c333912
            • Instruction ID: cb6fdb80f1a0a50fc636bbeb16a9405fceb03081af899a74e883cdbc37d72a03
            • Opcode Fuzzy Hash: 8abf3e8190de730396f286d91f5e2a7ed4eb175cdf0e41ad0ddcc9f30c333912
            • Instruction Fuzzy Hash: C62139719007098FDB10DFA9C4847EEBBF4EF48324F54842AD959A7241DB78A945CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04511D10
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 90a42698e924922d263f6c09232d6c496b3357d0bcb72437d1dd3b1de8feabbc
            • Instruction ID: ea248becb4c5041f7fca0fee597415f2e9804c5d25c1509cbebd76e72c2541a3
            • Opcode Fuzzy Hash: 90a42698e924922d263f6c09232d6c496b3357d0bcb72437d1dd3b1de8feabbc
            • Instruction Fuzzy Hash: B32128B1C003499FCF10CFA9C8846EEBBF5FF48314F508429E919A7240D7749950DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 04511A86
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: 28deb22ed187e8e7c2100c8fe59f26200d64e6226a2c7ca255028a8707ea5994
            • Instruction ID: 15031d7dffc81a7bb2e85568aaf7cce13aade5bd8f102d7944f72afdaacd88c6
            • Opcode Fuzzy Hash: 28deb22ed187e8e7c2100c8fe59f26200d64e6226a2c7ca255028a8707ea5994
            • Instruction Fuzzy Hash: B2211871D007498FDB10DFAAC8847EEBBF4EF48324F54842AD519A7241DB78A945CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022FB93F
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: cb8c2f745e0b0df4ac0d16e4fab5210e991b2e2a74e79f80b4a3da6c2bfc274d
            • Instruction ID: 9e74db55d1722f89259a0346495884ff5c96d29a12736d06ee7d07fd36f6f700
            • Opcode Fuzzy Hash: cb8c2f745e0b0df4ac0d16e4fab5210e991b2e2a74e79f80b4a3da6c2bfc274d
            • Instruction Fuzzy Hash: 0B21C2B5900259DFDB10CFA9D984ADEFBF8FB48324F14842AE958A7310D374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022FB93F
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 3e0612c81eb9f10f509df787be9ada76306b1b9c2bab9da0cde559f4c79fd0de
            • Instruction ID: 21d8b66a8bf5aa4e8b8acae0b920f8faaa839a8a0e59d9dde986416efc0f3c4b
            • Opcode Fuzzy Hash: 3e0612c81eb9f10f509df787be9ada76306b1b9c2bab9da0cde559f4c79fd0de
            • Instruction Fuzzy Hash: 8621D3B5900259DFDB10CFAAD984ADEFBF8FB48324F14842AE954A3310D374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 04514A85
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: a45e5b064cc097d9c4586bafa93cecd7cd392f8b22f7645e2b08a6662a1270c5
            • Instruction ID: 20ad96144d1eec61408605cfe2e88328738a6714d1aff825bd0ced1f26b9a00d
            • Opcode Fuzzy Hash: a45e5b064cc097d9c4586bafa93cecd7cd392f8b22f7645e2b08a6662a1270c5
            • Instruction Fuzzy Hash: 092136B68006499FDB10CF99D888BDEFBF4FB58324F20851AE558A3600C374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04511B4E
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: c787c9198166791680b2a307a305f6c115b957a646675ea7dac7f26ff63c6b6d
            • Instruction ID: 37428b952acd6f56e2907b2ed804c608ba1e35c2d701906bbbc8518f43e83bcd
            • Opcode Fuzzy Hash: c787c9198166791680b2a307a305f6c115b957a646675ea7dac7f26ff63c6b6d
            • Instruction Fuzzy Hash: 53116A719002499FDF10CFA9C844BDFBBF5EF88324F148829E529A7210D7759951CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022F9951,00000800,00000000,00000000), ref: 022F9B62
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 9746682434ede8a1d51a5cfa9c637b080211e69c4372542909ce8c7adc46053f
            • Instruction ID: 7cb4bb0e15321779dc7a1a2d69bded26097d6ae8742623ebc408a19f60f35b88
            • Opcode Fuzzy Hash: 9746682434ede8a1d51a5cfa9c637b080211e69c4372542909ce8c7adc46053f
            • Instruction Fuzzy Hash: FE1117B6D003099FDB10CF9AC544BDEFBF4EB88324F14852AD515A7200C374A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04511B4E
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: a9928af22a18c9dec8eed7581eb960df75aceab93615e686df88e62fc4c5b805
            • Instruction ID: 481ef2c2fb98c48067d170b38ee72b4b5205009bbb5374c07796e19f21619ff8
            • Opcode Fuzzy Hash: a9928af22a18c9dec8eed7581eb960df75aceab93615e686df88e62fc4c5b805
            • Instruction Fuzzy Hash: ED1137719006499FDF10DFA9C844BEFBBF9EF48324F148829D529A7250D775A950CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022F9951,00000800,00000000,00000000), ref: 022F9B62
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 915951a1201af13cf5bd0b13a018095d8025ec7383994b13e4d2f243f99e1a27
            • Instruction ID: 6d15c5925dfef2629ec859466aebb283505f3527f8886c6b19ad94ce107774ad
            • Opcode Fuzzy Hash: 915951a1201af13cf5bd0b13a018095d8025ec7383994b13e4d2f243f99e1a27
            • Instruction Fuzzy Hash: F911F6B69002498FCB10CF9AD584BDEFBF4EB88324F14852AD519A7600C375A985CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: fed1270ce093ef969e789063a05010680ddc3736dcc5673b1ab035a4691c3be9
            • Instruction ID: b53eaa195035dfc1c7f6ea0b7358dabd3a0430164c35b493c3b9ba59944c791c
            • Opcode Fuzzy Hash: fed1270ce093ef969e789063a05010680ddc3736dcc5673b1ab035a4691c3be9
            • Instruction Fuzzy Hash: 7A1188B1900348CFDB10DFA9D4843EEFBF5AB88324F14882AC569A7640D734A944CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: e01170aa037625736bcd66ff6c977f564e533076f01aaec188e5a82d4e2c98de
            • Instruction ID: 0d4cda4afc86db22c366c1e6317887a675d0d5708ba52064fdee4dd64a5099a4
            • Opcode Fuzzy Hash: e01170aa037625736bcd66ff6c977f564e533076f01aaec188e5a82d4e2c98de
            • Instruction Fuzzy Hash: 54113AB1D006498FDB10DFAAC8447EFFBF9AF88264F148829C529A7640D774A944CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 022F98D6
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 558bdc18f7f5cd08defc363a55e89dac63c1f95ac944b9f585c4a10c61687e65
            • Instruction ID: bc9a3fb9b87737ed57069c002f835ba0ff63b2de19b8d33f253c204999d52277
            • Opcode Fuzzy Hash: 558bdc18f7f5cd08defc363a55e89dac63c1f95ac944b9f585c4a10c61687e65
            • Instruction Fuzzy Hash: 4F1132B1C0064A8FCB10CF9AD444BDEFBF4EF88324F14842AC929A7204D374A585CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 022F98D6
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 8fc32980f098343221e723c4b5c2aacca4e71a73e9c6b6ede7e0096b0071cae7
            • Instruction ID: 99c6b74861a64b1a4a36ff9871f063bc42126d03c08468bd4479da7b06c5d3b4
            • Opcode Fuzzy Hash: 8fc32980f098343221e723c4b5c2aacca4e71a73e9c6b6ede7e0096b0071cae7
            • Instruction Fuzzy Hash: CF1102B5C006498FCB10CF9AC444BDEFBF8EF88324F14842AD919A7600D374A585CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 022FFF9D
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: 5ef89cfafbf8bba62d91f85db2f8fc7b84dfead0d9eca8bc51516b5af491fbde
            • Instruction ID: 18cd0b81af918cc62a4700d40247a69f967b6413b2bb7b2c7a8a349745d0a63e
            • Opcode Fuzzy Hash: 5ef89cfafbf8bba62d91f85db2f8fc7b84dfead0d9eca8bc51516b5af491fbde
            • Instruction Fuzzy Hash: B61136B58002098FDB10CF9AD588BDEFBF4EB48324F108519D925A7740D374A940CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 04514A85
            Memory Dump Source
            • Source File: 00000009.00000002.268826815.0000000004510000.00000040.00000001.sdmp, Offset: 04510000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: 74711385a8ae60251cfdada9109933047b8773a04af877c87ab45d3d1b2d9fde
            • Instruction ID: 57cee03632ce62c655264a88459d0df4782ff816f0d68dfd4b3ab1710307d109
            • Opcode Fuzzy Hash: 74711385a8ae60251cfdada9109933047b8773a04af877c87ab45d3d1b2d9fde
            • Instruction Fuzzy Hash: 3D1115B58003499FDB10CF99C884BDFBBF8FB48324F10841AE918A3600C374A984CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 022FFF9D
            Memory Dump Source
            • Source File: 00000009.00000002.261672401.00000000022F0000.00000040.00000001.sdmp, Offset: 022F0000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: 0e74e4e1f9334840fc235d0c98a9ab944a8f4824f9180ba9a296a7370ca4db11
            • Instruction ID: 42185163fb5d2b06c7d9610ebfc31c95a6dd616b4dc8872d3a3315688cc32e31
            • Opcode Fuzzy Hash: 0e74e4e1f9334840fc235d0c98a9ab944a8f4824f9180ba9a296a7370ca4db11
            • Instruction Fuzzy Hash: 2C1115B58002098FDB10CF99D984BDFFBF8EB48324F10851AD914A3740C374A944CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            Non-executed Functions

            Executed Functions

            APIs
            • GetCurrentProcess.KERNEL32 ref: 00B8B6F0
            • GetCurrentThread.KERNEL32 ref: 00B8B72D
            • GetCurrentProcess.KERNEL32 ref: 00B8B76A
            • GetCurrentThreadId.KERNEL32 ref: 00B8B7C3
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID:
            • API String ID: 2063062207-0
            • Opcode ID: 5ccc8ceff9a9e44e51bcb4dde5fc8f5ed83b6943261bffbc4fc96218691116bc
            • Instruction ID: 6526537aac91b1347412849ed965c5890af21a212e482b734f70ce0777f172a5
            • Opcode Fuzzy Hash: 5ccc8ceff9a9e44e51bcb4dde5fc8f5ed83b6943261bffbc4fc96218691116bc
            • Instruction Fuzzy Hash: B65176B49007488FDB14CFA9C588BEEBBF1EF88314F2485AAE419A7360D7745945CF25
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32 ref: 00B8B6F0
            • GetCurrentThread.KERNEL32 ref: 00B8B72D
            • GetCurrentProcess.KERNEL32 ref: 00B8B76A
            • GetCurrentThreadId.KERNEL32 ref: 00B8B7C3
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID:
            • API String ID: 2063062207-0
            • Opcode ID: a5da1047ded65788b106901e6a080fc6e3deaa7177c43d41b754022ef703ebcd
            • Instruction ID: 495f3859aa5c9208a0715f9452c1291e03c85b6c32c5161447716d22196f0dbb
            • Opcode Fuzzy Hash: a5da1047ded65788b106901e6a080fc6e3deaa7177c43d41b754022ef703ebcd
            • Instruction Fuzzy Hash: F85165B49007488FDB14CFAAC588BEEBBF1EF88314F20856AE419A7360D7745984CF65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0450205E
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: 4dadde0583f80e706b724d0550c45f63c3fe37e85018deb76a830f7494c48c4d
            • Instruction ID: 67ed1a6bb6d4cc3872ba7063e4adfbb3990899cab2418da7626a4215d86d43e4
            • Opcode Fuzzy Hash: 4dadde0583f80e706b724d0550c45f63c3fe37e85018deb76a830f7494c48c4d
            • Instruction Fuzzy Hash: AFA18F75D00619DFDF20CFA4D8857DEBBB2BF48314F1485A9E808A7280DB71A985DF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0450205E
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: 3e9c868a1c8deb2918e1b6d3c859398f58e9ef44f90a9c9a9c40856b57250f4f
            • Instruction ID: 568f3435bf7b5bdecb1041381da53710a13bc8d9ca898d30b18244ae3a92766f
            • Opcode Fuzzy Hash: 3e9c868a1c8deb2918e1b6d3c859398f58e9ef44f90a9c9a9c40856b57250f4f
            • Instruction Fuzzy Hash: B8919F75D00619DFDF20CFA4C8857DEBBB2BF48314F1485A9E808A7280DB71A985DF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B8FE0A
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: dada9f6c662e63d03bb64c7948533c99318d2e75c53532f3290cfa06c15721b9
            • Instruction ID: 3dc0729e87eb4f4609b78d9f58e134687086f564ba4f1ea7d332b07790affdd6
            • Opcode Fuzzy Hash: dada9f6c662e63d03bb64c7948533c99318d2e75c53532f3290cfa06c15721b9
            • Instruction Fuzzy Hash: 6051B0B1D002499FDB14DFA9C884ADEBBB5FF48314F24816AE819AB221D7749985CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B8FE0A
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: c0408b072e1bfb3b82f77a1a5c56f422a09d3054a25e1fe70891802eec2db27c
            • Instruction ID: 697408837b08d882085ba64385593190700260f5a6ad9884d89ee96ebb42421a
            • Opcode Fuzzy Hash: c0408b072e1bfb3b82f77a1a5c56f422a09d3054a25e1fe70891802eec2db27c
            • Instruction Fuzzy Hash: 5641A0B1D00309DFDB14DF99C884ADEBBB5FF48314F24812AE819AB224D7749985CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 00B85421
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: 59feaf11281ba2e9e18b7430e7bd4e37d349029f84da5a0e9b2a20e3ac3516e5
            • Instruction ID: 8a7746a0c7ed11308cc6ff1ab85ec85c5da9737302ff6060e600c937e24eefb0
            • Opcode Fuzzy Hash: 59feaf11281ba2e9e18b7430e7bd4e37d349029f84da5a0e9b2a20e3ac3516e5
            • Instruction Fuzzy Hash: 12410171C00618CEDB24DFA9C884BDEBBB5FF48308F2480AAD408AB255D771598ACF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 00B85421
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: a53da974811d79d5f3754d2b82f57dfd60547b1a34123f0a66670f3c80b6ee36
            • Instruction ID: d6ddabbc35c7fdde361a86fd8c3ed00db9d53b062a0269c6467b17dc97ba150d
            • Opcode Fuzzy Hash: a53da974811d79d5f3754d2b82f57dfd60547b1a34123f0a66670f3c80b6ee36
            • Instruction Fuzzy Hash: F841D171C00618CBDB24DFA9C884BDEBBF9BF48304F24846AD409AB255D7756989CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04501C30
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: 785282f6252f556f160ce751e13f234b0b363b1f6636c7f83ced146954334d5f
            • Instruction ID: 4caa8f42e08d3c36cd081e9227acd8d60a0311c29cec9f7de1bb2ff1542c5d59
            • Opcode Fuzzy Hash: 785282f6252f556f160ce751e13f234b0b363b1f6636c7f83ced146954334d5f
            • Instruction Fuzzy Hash: 992137719003599FDF10CFA9C8847EEBBF5FF48314F148829E929A7240D7789955CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04501C30
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: b159d06678fc10a20fa539afe8778e88b67484b3adfc7ee611b364be30592b0e
            • Instruction ID: 7dfe951980e07f59c7edc9576c0cff3bb48f2a4244c58755e66245dd19f630ea
            • Opcode Fuzzy Hash: b159d06678fc10a20fa539afe8778e88b67484b3adfc7ee611b364be30592b0e
            • Instruction Fuzzy Hash: D12146B19003499FCF10CFA9C884BEEBBF5FF48314F148429E918A7240D778A954CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04501D10
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 944c3afb7c9fbf1f19c3f384b593ffeea7a8303e7a5d61b31072f0171cc961bf
            • Instruction ID: 667475a2a77a039445e23b4e7d3f3bc7cd86791c33783c48367776223ed5bf83
            • Opcode Fuzzy Hash: 944c3afb7c9fbf1f19c3f384b593ffeea7a8303e7a5d61b31072f0171cc961bf
            • Instruction Fuzzy Hash: C52139B1C002499FCF10CFA9C884AEEBBF5FF48314F14842AD929A7240D7359955DBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 04501A86
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: 1af98eb731fa655c4690cabb218f3046b95fc23d17a385471100cd29de5215bd
            • Instruction ID: c9cedfe2d6b4be35761afb97593581740377a60bdc44de0a80f67a13642bd20a
            • Opcode Fuzzy Hash: 1af98eb731fa655c4690cabb218f3046b95fc23d17a385471100cd29de5215bd
            • Instruction Fuzzy Hash: 242137759007098FDB10DFA9C4847EEBBF4EF48324F54842AD519A7241DB78AA85CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04501D10
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 517b94bae644996ca345330333bb22d4dcd4c8185c331fbd7d5381f2ef20545f
            • Instruction ID: 9a721089ed1893e0dc3b6bf4c97be28fc9cd5e0fbeee6e48791438ef20fbfce2
            • Opcode Fuzzy Hash: 517b94bae644996ca345330333bb22d4dcd4c8185c331fbd7d5381f2ef20545f
            • Instruction Fuzzy Hash: 8D2128B1C003499FCF10CFA9C884AEEBBF5FF48314F548429E929A7240D7759954DBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 04501A86
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: c70dd95710213a492942c9fc3a47a3ab28e4f75a2d9a0575ade34e6c3a81e43d
            • Instruction ID: 0231e5cacbd299079f5513b0f6c14973d98d96e7be6a6a3e3d9750adb9983470
            • Opcode Fuzzy Hash: c70dd95710213a492942c9fc3a47a3ab28e4f75a2d9a0575ade34e6c3a81e43d
            • Instruction Fuzzy Hash: B8213571D007098FDB10DFAAC4847EEBBF4EF48324F54842AD519A7240DB78AA85CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B8B93F
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 4eb254f81ebfbac436cad59994dc8d0edf74673760d0f866503d5c2cf72aa6d3
            • Instruction ID: 2d584aa2488757b89162593f2b8d1b94ccfdd22799acb06114eb09972edcf52f
            • Opcode Fuzzy Hash: 4eb254f81ebfbac436cad59994dc8d0edf74673760d0f866503d5c2cf72aa6d3
            • Instruction Fuzzy Hash: 5F21F5B59002499FDB10CFA9D884AEEBFF4FB48324F14845AE958A3310D374A954CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 04504A85
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: 2451a39387893f4bc45bd99e3467e7785478a8547d90f3b6077a9fd8e8943878
            • Instruction ID: 1e7e612aca58fb524f6a364e8594ee80dcf398ba6cfba66bd0be2688124a9dd9
            • Opcode Fuzzy Hash: 2451a39387893f4bc45bd99e3467e7785478a8547d90f3b6077a9fd8e8943878
            • Instruction Fuzzy Hash: C8215BB6D00248DFDB10CF99E445BDEBBF4FB58324F14841AD558A3640C334A944CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B8B93F
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 926fe29e480aa7444786d93e683d5d414fde05b33aa8b7900fca9cdc511397ad
            • Instruction ID: 6a22ca0dc6704df307a9237d4650e159b1f810f576e24c9246a13d648368bd9b
            • Opcode Fuzzy Hash: 926fe29e480aa7444786d93e683d5d414fde05b33aa8b7900fca9cdc511397ad
            • Instruction Fuzzy Hash: 6F21D3B59002599FDB10CFA9D884ADEBBF8FB48324F14841AE958A3310D374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04501B4E
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: b97e36968da8e3f34a54f9d4e802c1f182abc612f8ce10af5314cd7eef5c01a6
            • Instruction ID: fab259175f36889411f62729a71ca5defbb27727512388aa1a4327b5b677faec
            • Opcode Fuzzy Hash: b97e36968da8e3f34a54f9d4e802c1f182abc612f8ce10af5314cd7eef5c01a6
            • Instruction Fuzzy Hash: 10116A719002489FCF10DFA9C8447EFBBF5EF48324F148829E529A7240D7759950CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B89951,00000800,00000000,00000000), ref: 00B89B62
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 80e29bcb1766d49cd984e86ef52a6d7e70fa4f4e33fd91c4e58d153920c99cde
            • Instruction ID: e4967dbd6e96071551150c51bdc8189a5c8f8f6b46a320b7bf5c96b90a16baf5
            • Opcode Fuzzy Hash: 80e29bcb1766d49cd984e86ef52a6d7e70fa4f4e33fd91c4e58d153920c99cde
            • Instruction Fuzzy Hash: 0A1117B29003099FCB10DF9AD484AEEFBF4EB48320F14856ED515A7210C3B4A945CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 00B898D6
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 40c7a02800cd43e55bf02f8b8336ee3da08b9a5afdd48eaf240e68efdef04de5
            • Instruction ID: 255f61222c4945f3181795926c3ca6a749aba44ddf0babbe684e2eaf67a3c432
            • Opcode Fuzzy Hash: 40c7a02800cd43e55bf02f8b8336ee3da08b9a5afdd48eaf240e68efdef04de5
            • Instruction Fuzzy Hash: FE2147B1C0064A8FCB10CF9AC484AEEFBF4EF4A324F18855AC469B7611C3746546CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: fcfc1733cadba2051c054cf6357f70a5e0838a229415cef3dbc0d47c28e91c39
            • Instruction ID: a5d09ee0684e027b812cabf3bfcfa87118e362915a7abb35ef162163cd58b709
            • Opcode Fuzzy Hash: fcfc1733cadba2051c054cf6357f70a5e0838a229415cef3dbc0d47c28e91c39
            • Instruction Fuzzy Hash: 051188B19002488FCB10DFA9D4857EFFBF5EB88324F14882AC529A7240D735A941CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B89951,00000800,00000000,00000000), ref: 00B89B62
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 013a5e0fd06d2ca77dcb5d7136fc21be151fc4d089f48f5f757b62640a72d9ed
            • Instruction ID: c2e1ec741abac96bb6610c97e408c7dd53f19e32252a641b2254a96d85501b44
            • Opcode Fuzzy Hash: 013a5e0fd06d2ca77dcb5d7136fc21be151fc4d089f48f5f757b62640a72d9ed
            • Instruction Fuzzy Hash: 961126B2D002498FCF10CFAAD484AEEFBF4EB88320F14852ED419A7200C374A945CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04501B4E
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 6dfd8769387396ac58dbedf75e5f88017b9033f99e53dc9dc29fc2a57cdf0675
            • Instruction ID: e6bb7deb1fabb310d2ddd8520cc8518919134fbec85d22a7a4fbb3c903971887
            • Opcode Fuzzy Hash: 6dfd8769387396ac58dbedf75e5f88017b9033f99e53dc9dc29fc2a57cdf0675
            • Instruction Fuzzy Hash: 791167718002488FCF10DFA9C844BEFBBF9EF48324F148819E529A7240D775A950CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: cd8a44491a83937606c59dcc7be853cbacefa55966c8ef70f04ad8729ebafc22
            • Instruction ID: a32411a1931f21398d5f3a04f2c0d4bb83a5b796ca5158d0687c4cd24046a0a0
            • Opcode Fuzzy Hash: cd8a44491a83937606c59dcc7be853cbacefa55966c8ef70f04ad8729ebafc22
            • Instruction Fuzzy Hash: F5113AB1D006488FDB10DFAAC4447EFFBF9EB88324F148829D529A7640D775A944CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 00B898D6
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 16e8c7ba2791d7da92bb72ddd89e24738a5bf901452e9bae3f39721c1c8049aa
            • Instruction ID: 83c5452278ce63bdc519ba2735a60207fb32d0127508cae79920f23cd36573d7
            • Opcode Fuzzy Hash: 16e8c7ba2791d7da92bb72ddd89e24738a5bf901452e9bae3f39721c1c8049aa
            • Instruction Fuzzy Hash: 1F1113B2C006498FDB10DF9AC444BDEFBF4EB89324F14856AD429B7610D374A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 00B8FF9D
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: 2471e6dec61aefe628199b11d7d4f9334afc2a9e81b08d1671fb40df6529c635
            • Instruction ID: 303296584fbf0332732fc8877d3580ef97887168ee73bd9ba8adb39908876237
            • Opcode Fuzzy Hash: 2471e6dec61aefe628199b11d7d4f9334afc2a9e81b08d1671fb40df6529c635
            • Instruction Fuzzy Hash: 381136B1800209CFDB10CF89C489BDEFBF4FB48324F14845AD915A7640D374A984CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 04504A85
            Memory Dump Source
            • Source File: 0000000B.00000002.277176244.0000000004500000.00000040.00000001.sdmp, Offset: 04500000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: 9b11a3eb21ea4fd2bea3503dbf9bfc14afd242c6fc191d9a159b1c0e9103fa26
            • Instruction ID: e8375772a2022656509adc4ecaf666c4d96535b1ebf683d6d8a8ee11faf983a0
            • Opcode Fuzzy Hash: 9b11a3eb21ea4fd2bea3503dbf9bfc14afd242c6fc191d9a159b1c0e9103fa26
            • Instruction Fuzzy Hash: E611E5B58003499FDB10CF99D885BDFBBF8FB48324F148419E558A7640D374A984CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 00B8FF9D
            Memory Dump Source
            • Source File: 0000000B.00000002.273394243.0000000000B80000.00000040.00000001.sdmp, Offset: 00B80000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: 79201c9ba95371d4bc0952c7d44201fc9239e1b4d7f55d1804102cb3188f78db
            • Instruction ID: 128a06a376380c79ae484ce2691ee7c483b2de6f5ab9738a6de3e6c0f937b3e6
            • Opcode Fuzzy Hash: 79201c9ba95371d4bc0952c7d44201fc9239e1b4d7f55d1804102cb3188f78db
            • Instruction Fuzzy Hash: 521115B58002098FDB10DF99D485BDEFBF8EB48324F14851AD918A3340C374A984CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.272817336.000000000095D000.00000040.00000001.sdmp, Offset: 0095D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cbfb22788943724a532731cc6c9591bee2453eb03b6af86081f36c9359ccbd57
            • Instruction ID: b6c2c186d42ca8f991db9ce3f286f17b2899a49b431464d0da92f83903bfe670
            • Opcode Fuzzy Hash: cbfb22788943724a532731cc6c9591bee2453eb03b6af86081f36c9359ccbd57
            • Instruction Fuzzy Hash: A2212571504240DFDB21DF54D8C0B66BF69FB88329F34C969EC050B24AD33AD85ADBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.273048241.0000000000ABD000.00000040.00000001.sdmp, Offset: 00ABD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 92c122b623883fc8a89637bb14af53b080103f3455881d90c0d1c97f608be8c8
            • Instruction ID: e4fd4ce8c655fd3383c993aa5c5ef3c70c2af1fa107d1d432265005104e0cea8
            • Opcode Fuzzy Hash: 92c122b623883fc8a89637bb14af53b080103f3455881d90c0d1c97f608be8c8
            • Instruction Fuzzy Hash: E5210475504240EFCB14EF54D8C4B96BB69FB88324F24C969D80A4B247D33AD847CA61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.273048241.0000000000ABD000.00000040.00000001.sdmp, Offset: 00ABD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5642721a1e6d80374e437fa5b2a2b728b714f109b8ea234dff7d9c9aabb27cf5
            • Instruction ID: 6f0446c2f08d49a19bd7c327bd2ed01651b231f05fb8fb406f42d9505c5df7fc
            • Opcode Fuzzy Hash: 5642721a1e6d80374e437fa5b2a2b728b714f109b8ea234dff7d9c9aabb27cf5
            • Instruction Fuzzy Hash: F621D475504280EFDB05DF54D9C4BA6BBA9FB88318F24CA69E8094B247E336D846CB61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.272817336.000000000095D000.00000040.00000001.sdmp, Offset: 0095D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f56c5d28dc22c36c06b9c0244b20b8a5410b3a40b9b7180f2002089e4cc55e97
            • Instruction ID: 879478c832ef00f925c173a5738bc94958710817c1e583e8027fdfaaf4fa9727
            • Opcode Fuzzy Hash: f56c5d28dc22c36c06b9c0244b20b8a5410b3a40b9b7180f2002089e4cc55e97
            • Instruction Fuzzy Hash: 4B11D376404280CFCB11CF10D5C4B56BF71FB84324F24C6A9EC450B65AD336D99ACBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.273048241.0000000000ABD000.00000040.00000001.sdmp, Offset: 00ABD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction ID: cc4069a74dcc012032fc5a9cc532fa004556f416a79a55d573dc605f03704ca9
            • Opcode Fuzzy Hash: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction Fuzzy Hash: 45118B75504280DFCB11CF10D5C4B95BFA1FB84324F28C6A9D8494B656D33AD85ACB61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.273048241.0000000000ABD000.00000040.00000001.sdmp, Offset: 00ABD000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction ID: 5b9a41f89806d4376c924f4d5a3363812862164974d153574773c2b1ca481e4b
            • Opcode Fuzzy Hash: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction Fuzzy Hash: 7B11DD75504280CFCB11DF10D5C4B55FFA2FB84324F28C6AAD80A4B656C33AD85ACBA2
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.272817336.000000000095D000.00000040.00000001.sdmp, Offset: 0095D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7d2dfb0b479a1880d885346975c600942351c17bc736ed968116ee20105e9288
            • Instruction ID: b025e40d0d1c4b89232ddd38c96cab3d2c51d6fa7471e337f701c2d3fedad4a0
            • Opcode Fuzzy Hash: 7d2dfb0b479a1880d885346975c600942351c17bc736ed968116ee20105e9288
            • Instruction Fuzzy Hash: AA01F7B10053409AE730CB52DCC4BA7BB9CDF49375F18895AED044A246E3789848CBB1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000B.00000002.272817336.000000000095D000.00000040.00000001.sdmp, Offset: 0095D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5809baaa150f30c72e53f8f1c35e487b684d866679247c82e5861b87ab393028
            • Instruction ID: 34b79e55a02780ecfd2d45fff5b2f915b5feef8f086d5b7dd455006a26ebdc3d
            • Opcode Fuzzy Hash: 5809baaa150f30c72e53f8f1c35e487b684d866679247c82e5861b87ab393028
            • Instruction Fuzzy Hash: 64F0C2B14052449AFB208E16DC88B66FB9CEB85374F18C45AED084B286D3789C88CBB0
            Uniqueness

            Uniqueness Score: -1.00%

            Non-executed Functions

            Executed Functions

            APIs
            • GetCurrentProcess.KERNEL32 ref: 00EAB730
            • GetCurrentThread.KERNEL32 ref: 00EAB76D
            • GetCurrentProcess.KERNEL32 ref: 00EAB7AA
            • GetCurrentThreadId.KERNEL32 ref: 00EAB803
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID: H
            • API String ID: 2063062207-1105002124
            • Opcode ID: 5948cbbb0f077e0860ae8a09681f2813555fd8caef919d42be664d57e2f9c5c5
            • Instruction ID: ae0b09079fba324ea4f223c3d79366ec8108874a73c02b25ce0fef9bce66103f
            • Opcode Fuzzy Hash: 5948cbbb0f077e0860ae8a09681f2813555fd8caef919d42be664d57e2f9c5c5
            • Instruction Fuzzy Hash: 715187B0A007588FDB10CFA9C588BEEBBF1AF89314F24855AE409BB351D7745885CF65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32 ref: 00EAB730
            • GetCurrentThread.KERNEL32 ref: 00EAB76D
            • GetCurrentProcess.KERNEL32 ref: 00EAB7AA
            • GetCurrentThreadId.KERNEL32 ref: 00EAB803
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: Current$ProcessThread
            • String ID: H
            • API String ID: 2063062207-1105002124
            • Opcode ID: 3c231cc5d5aaecd2acd2442437d224f272747fdfd130500420b149dd3d10b49b
            • Instruction ID: 262dc21f6cc6a55600d103902d5740d3494a4ab06b8c1caf70208a1f8e15c423
            • Opcode Fuzzy Hash: 3c231cc5d5aaecd2acd2442437d224f272747fdfd130500420b149dd3d10b49b
            • Instruction Fuzzy Hash: D85166B0E007588FDB14CFA9C588BDEBBF1AB89314F20856AE419B7350D7746984CF65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00EAFD0A
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: f8a53f636f32e2f49bcb675e6b1bedd78c19ce88cedf1066e6e92b6c6ceb038b
            • Instruction ID: a94807730f3d48e12cdd991ef15c0538dd5a5d8c4e246b5d9168bf428db9ba90
            • Opcode Fuzzy Hash: f8a53f636f32e2f49bcb675e6b1bedd78c19ce88cedf1066e6e92b6c6ceb038b
            • Instruction Fuzzy Hash: D19154719093899FCB02CFA9C894ADDBFB1EF4A314F19419AE884AF263C7349455CF51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 00EA962E
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 5b4c396e54d3f463ff432bf94f08cd648dc8d1169412f8afe150138b4fbb869c
            • Instruction ID: 6b40fcf4bc5a20bb09451eca824e6beaa87ccde0916b3552103d80b91127845f
            • Opcode Fuzzy Hash: 5b4c396e54d3f463ff432bf94f08cd648dc8d1169412f8afe150138b4fbb869c
            • Instruction Fuzzy Hash: D7713670A00B058FD724DF69C48179AB7F5BF89314F108A2EE496EBA41E734F906CB91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00EAFD0A
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: 35aacdead227e87bf1fd01336c5b9d45b7d2957e6cbf9587ebc66919859f1b06
            • Instruction ID: 7d20ae8f7ef134a64ebb5577ae755284435298aa438eb7b3e05dfd22b9c0efdf
            • Opcode Fuzzy Hash: 35aacdead227e87bf1fd01336c5b9d45b7d2957e6cbf9587ebc66919859f1b06
            • Instruction Fuzzy Hash: FD4190B1D003499FDB15CFEAC884ADEBBB5BF48314F24952AE819AB210D774A945CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EABD87
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 533918166c0cb13a59122653f90bdcfa110b34683ca358e9fbbeb0e2b3970455
            • Instruction ID: aaa120bff95e19b024be707ddc27ed6af07c46419426840e4fc9b99fb21d76d3
            • Opcode Fuzzy Hash: 533918166c0cb13a59122653f90bdcfa110b34683ca358e9fbbeb0e2b3970455
            • Instruction Fuzzy Hash: 31416D74A44244DFE706AF71E958BBA7BB5EB89700F104629E9496F396DB701814CF10
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EABD87
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 049167d43841edcd3444f39e80b2ba128c05f370ac9663338b1eb417cf586640
            • Instruction ID: f3a27f0c6aeaee3312f45d1cd11707d504d1f19218431cf8850ef41fa55f0f9a
            • Opcode Fuzzy Hash: 049167d43841edcd3444f39e80b2ba128c05f370ac9663338b1eb417cf586640
            • Instruction Fuzzy Hash: A621E3B59002499FDB10CFA9D884AEEFFF4EB48324F14841AE955B7311D378A955CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EABD87
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 99b43cc89ba48ca497676e10c845ea9975de1d726d9a0e444b2e232658f45915
            • Instruction ID: 562e329fffcd5188de5837fc2c0be3645d5b1a12661ca8a5c7f786f76f6a68fc
            • Opcode Fuzzy Hash: 99b43cc89ba48ca497676e10c845ea9975de1d726d9a0e444b2e232658f45915
            • Instruction Fuzzy Hash: 0321C4B59002489FDB10CFAAD884ADEBBF8FB48324F14841AE914A7310D378A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EA96A9,00000800,00000000,00000000), ref: 00EA98BA
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 2eff95d62241b321225d34b67ae2c423777294c946f23d6cdb7e341b39d09bd2
            • Instruction ID: 54e40e94ff6c0f2da30830d27170c9798d10416361ddafdc678e112fc4a86c47
            • Opcode Fuzzy Hash: 2eff95d62241b321225d34b67ae2c423777294c946f23d6cdb7e341b39d09bd2
            • Instruction Fuzzy Hash: 5F2106B6D002498FDB10CFAAC444ADEFBF4AF89324F14852ED455B7601C379A945CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EA96A9,00000800,00000000,00000000), ref: 00EA98BA
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 8d5d44b89eea51e323cd5339fa497e251a43737877e76ac2651ad44eec9e7c89
            • Instruction ID: edc60a74fd8c97419411016ef7bec96df732723ac4ac073459a689cde40522de
            • Opcode Fuzzy Hash: 8d5d44b89eea51e323cd5339fa497e251a43737877e76ac2651ad44eec9e7c89
            • Instruction Fuzzy Hash: C31103B6D002098FDB14CF9AC444BDEBBF4EB49324F14842EE919BB600C378A945CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 00EA962E
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 96a5096ef34ab3cfc1b8f803eac59b1769beda32b6e1615c2c560897aaef383b
            • Instruction ID: 86a9168c6201c466c49a24fd4f8e169e1284060d69b91b637708f228f306b533
            • Opcode Fuzzy Hash: 96a5096ef34ab3cfc1b8f803eac59b1769beda32b6e1615c2c560897aaef383b
            • Instruction Fuzzy Hash: F411DFB6C006498FDB10CF9AC444BDEFBF4AF89324F24852AD829B7600D378A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 00EAFE9D
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: f76b48d80152eb119fa8c7c8a49bf050224cb0e68f2ad741033fda9b12b5d44c
            • Instruction ID: ba015371a41f66761990853d2e8e66d741aa9cafa0cf410af7e3576eb4b2fee3
            • Opcode Fuzzy Hash: f76b48d80152eb119fa8c7c8a49bf050224cb0e68f2ad741033fda9b12b5d44c
            • Instruction Fuzzy Hash: CF1145B59002488FDB10CF99C885BDEFBF8EB48324F24896AD854B7341C374A984CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?), ref: 00EAFE9D
            Memory Dump Source
            • Source File: 0000000C.00000002.280593266.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: b3cf619d72a0b26b65f9e586ca0d73bd83fcd3c308a972048af4a69591fa027e
            • Instruction ID: 57c5f5ee2232d10aa5f488dccfe62eba432a980273b6708e5145975b99c9e51a
            • Opcode Fuzzy Hash: b3cf619d72a0b26b65f9e586ca0d73bd83fcd3c308a972048af4a69591fa027e
            • Instruction Fuzzy Hash: 1F1103B58002488FDB10CF99D485BDEBBF8EB48324F20851AD915A7300C374A944CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            Non-executed Functions

            Executed Functions

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04D2205E
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: d9e406f8a281541e216619450bbc376f9cf47028b4325e00f195626908f1491b
            • Instruction ID: d97e285ed0481c8660aaa5d59dedbd2bd683105e257c8883005ac956461128a1
            • Opcode Fuzzy Hash: d9e406f8a281541e216619450bbc376f9cf47028b4325e00f195626908f1491b
            • Instruction Fuzzy Hash: 15916E71D00269CFDF20CFA4C9817EEBBB2BF58318F1485A9E819A7240DB749985CF91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04D2205E
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: 7acd453157ac9a9b3896936d66795188a27fe2864f0be208520a1810769fd858
            • Instruction ID: 96460911e7314666fad5b1a6dbc4b71adb8032597dedfd7673907003532dac03
            • Opcode Fuzzy Hash: 7acd453157ac9a9b3896936d66795188a27fe2864f0be208520a1810769fd858
            • Instruction Fuzzy Hash: 72916E71D00229DFDF10CFA4C9817DEBBB2BB58318F1485A9E819A7240DB759985CF91
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8c84a5332d0dbf48ebf7f0cccc3edff59bc49afda2ec7d72e5b41a4e30d89bb8
            • Instruction ID: 58513dd574132d8d92a45ed25e0d13e72f48e7bcd52dab0aba06e2a502f747a1
            • Opcode Fuzzy Hash: 8c84a5332d0dbf48ebf7f0cccc3edff59bc49afda2ec7d72e5b41a4e30d89bb8
            • Instruction Fuzzy Hash: 10816C71C093899FDB12CFA8C8509DDBFB1EF0A304F59819AE454EB262D3349886CB51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02B7FE0A
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: a3da830cfce5698c709ee9efbbb4c2a09e2aacfb717d97f1907a1fd1e5a77004
            • Instruction ID: 63b6a9bdf586037f3b4788611df27282410e5f84abf458d87d501b7a94b17120
            • Opcode Fuzzy Hash: a3da830cfce5698c709ee9efbbb4c2a09e2aacfb717d97f1907a1fd1e5a77004
            • Instruction Fuzzy Hash: C851AEB1D003099FDB14CFA9C884ADEBBB5FF48314F24856AE819AB210D7749985CF95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 02B75421
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: a470331f3f3f549d10690fdaace274ebfd1737aaf8ad8bb60f8e709ba10c00bc
            • Instruction ID: a672d93ced90ff50b8b0b974907acf55bdf91e6cbbefdfb30a407782a810cb52
            • Opcode Fuzzy Hash: a470331f3f3f549d10690fdaace274ebfd1737aaf8ad8bb60f8e709ba10c00bc
            • Instruction Fuzzy Hash: EC41F171C00618CBDB24DFA9C8847CEBBB5FF48308F6484A9D419BB251DB756985CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateActCtxA.KERNEL32(?), ref: 02B75421
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: e9e693c0fc223d7984f6a9fb16d7e143946682ae0d9a66b83e4be19751131f43
            • Instruction ID: 810dda364f857bfd36ec5f59aed619fc3281b6989887a9a31667e77f0609cca1
            • Opcode Fuzzy Hash: e9e693c0fc223d7984f6a9fb16d7e143946682ae0d9a66b83e4be19751131f43
            • Instruction Fuzzy Hash: 1241E271C00618CFDB24DFA9C8847DEBBB5BF48308F6484A9D418BB255DB756986CF90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02B7FF28,?,?,?,?), ref: 02B7FF9D
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: ec49acb86eb858645c59bed8af275f9d71f9159268a2db72f0b3c53eaa2f8e24
            • Instruction ID: 734d17ef27e744682ce3c2a8b37b487986bf1bbad1cb81589590c3d5f41edbe0
            • Opcode Fuzzy Hash: ec49acb86eb858645c59bed8af275f9d71f9159268a2db72f0b3c53eaa2f8e24
            • Instruction Fuzzy Hash: AF31EF72800348DFCB02CFA4D944ADEBFF0EF4A314F18849AE864AB611C7359954CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04D21C30
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: 1cc2ee10ef10e0215c5c5628551b1f8de73d0d8d9dac7631c10e7674ddb064e2
            • Instruction ID: 620b6984a23d37e8fa6327927ea1504a599df5860cfe72da512b00d058d6f54c
            • Opcode Fuzzy Hash: 1cc2ee10ef10e0215c5c5628551b1f8de73d0d8d9dac7631c10e7674ddb064e2
            • Instruction Fuzzy Hash: FA2124B19002598FDB10CFA9C9847EEBBF5FF48314F10882AE919A7240D778A954CBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04D21C30
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: ca161a9ebe92a3901731d63d80228ea098105dd32da666407ec9f3d8e1b8f3a5
            • Instruction ID: f14f037d2bce5976e5110e1036c5670e9561d4619f43657b13111123d7bc2e65
            • Opcode Fuzzy Hash: ca161a9ebe92a3901731d63d80228ea098105dd32da666407ec9f3d8e1b8f3a5
            • Instruction Fuzzy Hash: C02126B59003599FCF10CFA9C9847EEBBF5FF48314F148429E919A7240D778A954CBA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04D21D10
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 051ce13bdab3b73c557dfc77e43bca637820f390a14dbb65bdbb1b3e3491e09a
            • Instruction ID: b782f4149715b3bd3ffb75c07ca4e09a6124690b8c9c82864a53400b997f34d8
            • Opcode Fuzzy Hash: 051ce13bdab3b73c557dfc77e43bca637820f390a14dbb65bdbb1b3e3491e09a
            • Instruction Fuzzy Hash: 392136B1C003599FCB10CFA9C8807EEBBF5FF48314F50882AE919A7240D738A941CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 04D21A86
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: 6bcd80ba72c1497c80c03ee798415482a38f98e360975a1ff04acf545369b866
            • Instruction ID: cab8f0e1730e2abf29821571d5c9371870a8729368cf1161d35830a480f89aaa
            • Opcode Fuzzy Hash: 6bcd80ba72c1497c80c03ee798415482a38f98e360975a1ff04acf545369b866
            • Instruction Fuzzy Hash: FA215771D003499FDB10CFA9C4857EEBBF4EF48228F14842AD919A7240DB78A985CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02B7B87E,?,?,?,?,?), ref: 02B7B93F
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 8e6552aee5c404544863d5d7c15f9159a53a9b1bfc1c09387b9e3d9668134a5c
            • Instruction ID: 1e93f13f59cb14ee853c19957043173a73534c63ed16ab41363405277b135479
            • Opcode Fuzzy Hash: 8e6552aee5c404544863d5d7c15f9159a53a9b1bfc1c09387b9e3d9668134a5c
            • Instruction Fuzzy Hash: F921E6B5900208DFDB10CFA9D484ADEBFF8EB48324F14845AE914B7310D374A954CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04D21D10
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 52f058d2856348d99a4df22789d22f0a0f186c1cb735df068b14e3fd573650ae
            • Instruction ID: 3221d4d21b31479e70899c4bda6db12a8947d801625e9f6a2c61afb061913058
            • Opcode Fuzzy Hash: 52f058d2856348d99a4df22789d22f0a0f186c1cb735df068b14e3fd573650ae
            • Instruction Fuzzy Hash: C92116B1C002599FCB10CFA9C8846EEBBF5FF48314F508429E919A7240D7789950CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetThreadContext.KERNELBASE(?,00000000), ref: 04D21A86
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: ContextThread
            • String ID:
            • API String ID: 1591575202-0
            • Opcode ID: 7d16419752b7e1178644e7352450990274b3faf0a243a38d8ae2786b357d255c
            • Instruction ID: 284f8864437d009d627220a6d4d6a5f7e7b688a7635253a8c9986a42e7738004
            • Opcode Fuzzy Hash: 7d16419752b7e1178644e7352450990274b3faf0a243a38d8ae2786b357d255c
            • Instruction Fuzzy Hash: FA213771D002499FDB10DFA9C4847EEBBF4EF48224F148429D519A7240DB78A985CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02B7B87E,?,?,?,?,?), ref: 02B7B93F
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 43107f634860105b11c24f02574f0f7fb591f82d524d8010f839fa859c982674
            • Instruction ID: a819d5a322189ebd6b58826c76ebff6fedbdbd6eaa41ddee51b69e201a409dcb
            • Opcode Fuzzy Hash: 43107f634860105b11c24f02574f0f7fb591f82d524d8010f839fa859c982674
            • Instruction Fuzzy Hash: C821E4B5901249AFDB10CFA9D884AEEBFF8EB48324F14846AE954A7311D374A954CF60
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B79951,00000800,00000000,00000000), ref: 02B79B62
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: a08ab65dcd138219be0eb3f6a2b8bf4e69d35ae1025221360f95ad89f45eb710
            • Instruction ID: e5e33132d478b4c3a127eac112bc57cad79fb8489243c8847be1194ee4f305ea
            • Opcode Fuzzy Hash: a08ab65dcd138219be0eb3f6a2b8bf4e69d35ae1025221360f95ad89f45eb710
            • Instruction Fuzzy Hash: C01103B29006498FCB10CF9AC484ADEFBF8EB48324F14856AE525A7200C3B4A945CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: 9b97111da32135de1d70e9a30692aadbf1f5c81e4ecf3629f4f34674053a0ea9
            • Instruction ID: 46d075c960bd2947dd60829a86a251f23b1d594506cba277bfce28366ff13e63
            • Opcode Fuzzy Hash: 9b97111da32135de1d70e9a30692aadbf1f5c81e4ecf3629f4f34674053a0ea9
            • Instruction Fuzzy Hash: 17115B71D002588FDB10DFA9C4457EFFBF8EB48224F148829C525A7600D774A945CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04D21B4E
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: bbc82eedab0c05e82dcaf4961d214b8bfbad5aa44d2f8139a0bb2e12f7c525d6
            • Instruction ID: 6e79ea195b67333226b6765efc50b497072b7b43e2d7b810dde1afa1e5db1dff
            • Opcode Fuzzy Hash: bbc82eedab0c05e82dcaf4961d214b8bfbad5aa44d2f8139a0bb2e12f7c525d6
            • Instruction Fuzzy Hash: DC1144719002498FDB10CFA9C844BEFBBF5EB48324F14881AE529A7210D774A950CFA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04D21B4E
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: a1e0a30a566a2a4969d5c27c142d7d72057b9a4250d7a96c1e33ce5bfab46000
            • Instruction ID: 0a058519a8b21aaeb5e8b5a63049308961a3130371021907293702aa193006be
            • Opcode Fuzzy Hash: a1e0a30a566a2a4969d5c27c142d7d72057b9a4250d7a96c1e33ce5bfab46000
            • Instruction Fuzzy Hash: 541134729002489FCF10DFA9C844BEFBBF9EF48324F148829E529A7250D775A950CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B79951,00000800,00000000,00000000), ref: 02B79B62
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 1022075a0313ae94f665ca3deda60eee5476cb0a5928e88a508fceaef3230a72
            • Instruction ID: 208eb4c57a12372516cc84c5133e8115cfb79108349710d42380dcd5bb33045a
            • Opcode Fuzzy Hash: 1022075a0313ae94f665ca3deda60eee5476cb0a5928e88a508fceaef3230a72
            • Instruction Fuzzy Hash: CE11E2B6D006098FDB10CFA9C584BDEFBF8EB88324F14856AD529A7700D374A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 04D24A85
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: 9fbb6bff8684ec62fc4ac2ec5f5478d0eb117c87976ad850069c9e741769fc8d
            • Instruction ID: 63141ee5d0839239d0fd477be236ede89024aa0e7539b58020fc8f8c27f48bf8
            • Opcode Fuzzy Hash: 9fbb6bff8684ec62fc4ac2ec5f5478d0eb117c87976ad850069c9e741769fc8d
            • Instruction Fuzzy Hash: 2B1146B18043889FDB11CF99C884BDEBFF8EB49324F14845AE858A7201C378A944CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindCloseChangeNotification.KERNELBASE(?), ref: 04D25468
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: ChangeCloseFindNotification
            • String ID:
            • API String ID: 2591292051-0
            • Opcode ID: 876dfde0abd9bbf0a35fae6d80eb09bdc2d47506cc3774172b915ee6d1116125
            • Instruction ID: 2d9b29c3eb883f197983e75bc240672fa144bab73e7edfde22dd059e1c9aa6ac
            • Opcode Fuzzy Hash: 876dfde0abd9bbf0a35fae6d80eb09bdc2d47506cc3774172b915ee6d1116125
            • Instruction Fuzzy Hash: 701148B28006199FDB10CFA9C585BDEFBF4EB48324F14842AD958A7740D738A985CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: 406a11a6dfdafabc85aa76fb92ab5b1831a281aa301e9930122f658f2f10f7b7
            • Instruction ID: 17bb48e81c0d74032f0fc55a84315aca3ea98abcfd4175afc5b57e6314eaaa12
            • Opcode Fuzzy Hash: 406a11a6dfdafabc85aa76fb92ab5b1831a281aa301e9930122f658f2f10f7b7
            • Instruction Fuzzy Hash: 24113AB1D002588FDB10DFAAC4447EFFBF9EB48224F148829C529A7640D774A945CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 02B798D6
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 60b7510eb2cab45fa9a7c8f53480c9b3d356aef7e06053e08e123395fa27a02e
            • Instruction ID: 511c33e9831b43c66dbc31078004a996ad0247c8b2f9278f80f323cc00d89282
            • Opcode Fuzzy Hash: 60b7510eb2cab45fa9a7c8f53480c9b3d356aef7e06053e08e123395fa27a02e
            • Instruction Fuzzy Hash: CD1102B6C006498FDB10CF9AC444BDEBBF4EF89364F14846AD829B7600D379A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindCloseChangeNotification.KERNELBASE(?), ref: 04D25468
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: ChangeCloseFindNotification
            • String ID:
            • API String ID: 2591292051-0
            • Opcode ID: 746b12707008ef1e6bbe6454ee5693126b70056ae45c64b8ea1fcb3551304b9a
            • Instruction ID: f9768325bf3e386f7e7bdf352ff6ef53bb23be5a249016f5c15fccacaedd012a
            • Opcode Fuzzy Hash: 746b12707008ef1e6bbe6454ee5693126b70056ae45c64b8ea1fcb3551304b9a
            • Instruction Fuzzy Hash: B11145B18006198FCB10CFA9C584BDEFBF8EB48324F14842AD958A7740D338A985CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNELBASE(00000000), ref: 02B798D6
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 8284200e585cbf5f7b7183faf696f9f8cc17bce4f26def98cdb6266f756391ad
            • Instruction ID: 7d37fa9e8b98fcf0271202c92bd47675deef12e903dbdc932f21a3d3028cc968
            • Opcode Fuzzy Hash: 8284200e585cbf5f7b7183faf696f9f8cc17bce4f26def98cdb6266f756391ad
            • Instruction Fuzzy Hash: 0F11E0B6D006498FDB10CF9AD444BDEFBF8EB88324F14856AD829B7600D378A545CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02B7FF28,?,?,?,?), ref: 02B7FF9D
            Memory Dump Source
            • Source File: 0000000D.00000002.279957082.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: d454101279dc8c9612b2179f75cba05513792c95da15b3971682264d18ba5840
            • Instruction ID: ddaccde88ee437d9844dc666f2f4e281d95b10679a36066882b277b2e82fd596
            • Opcode Fuzzy Hash: d454101279dc8c9612b2179f75cba05513792c95da15b3971682264d18ba5840
            • Instruction Fuzzy Hash: 1F1106B59002089FDB10CF99D584BEFBBF8EB48324F108459E925A7740D374A944CFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageW.USER32(?,?,?,?), ref: 04D24A85
            Memory Dump Source
            • Source File: 0000000D.00000002.284106418.0000000004D20000.00000040.00000001.sdmp, Offset: 04D20000, based on PE: false
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: da88801ea4f6a9f5f47048ecedd8219cb81567232b907115ed583b97308f0d01
            • Instruction ID: 6e5096cfc7d00568332508ea048b5dc5cb902e00d977a564907c793ef230a6bb
            • Opcode Fuzzy Hash: da88801ea4f6a9f5f47048ecedd8219cb81567232b907115ed583b97308f0d01
            • Instruction Fuzzy Hash: 0311D3B58007599FDB10CF99C985BDFBBF8FB58324F148419E919A7600D374A984CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279463067.000000000121D000.00000040.00000001.sdmp, Offset: 0121D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 61e5dcbb97dbbed17336361925767ea50d053c06ccab2ed663328733790fca6e
            • Instruction ID: ab0fa40dd26c97912449ea98106e034867846a2682debf57cb6e5b7ef0d17efd
            • Opcode Fuzzy Hash: 61e5dcbb97dbbed17336361925767ea50d053c06ccab2ed663328733790fca6e
            • Instruction Fuzzy Hash: 7B214871514244EFCB01DF94E8C8B67BFA5FB98328F248569D9050B20AC336D455CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279516052.000000000133D000.00000040.00000001.sdmp, Offset: 0133D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 693875aca9ea044f62b87bd1dcb83f75d8e3d7b91534fce31b684b44a5755e85
            • Instruction ID: 97812e65f19a6827a3d015bbe174f8708bddb576d02a863e30aafae00f80128a
            • Opcode Fuzzy Hash: 693875aca9ea044f62b87bd1dcb83f75d8e3d7b91534fce31b684b44a5755e85
            • Instruction Fuzzy Hash: F3212671504204EFDB01DF94D9C0B26BBA9FBC8328F64C96DE8098B742C73AD856CB61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279516052.000000000133D000.00000040.00000001.sdmp, Offset: 0133D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0f4d08a87e59a8810c52f0669d306344843448cd1eaad949d66c43778c092e4c
            • Instruction ID: 0e8aa0e8abb825d6625eb0bdde2eae6cc54780f1ef97ba5db620373296e4cb38
            • Opcode Fuzzy Hash: 0f4d08a87e59a8810c52f0669d306344843448cd1eaad949d66c43778c092e4c
            • Instruction Fuzzy Hash: 08212271504204DFCB11CFA4D8C4B16FB69FB88B68F64C969E80A0B646C33AD846CA61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279516052.000000000133D000.00000040.00000001.sdmp, Offset: 0133D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fd7cc8dc33300e28ec206efda17457d71feb43ee51eae797dc888ef6a093873d
            • Instruction ID: a02c144115d7c9c2c24b66461da63c96726e4fb4e86f72004222cec234b8ed35
            • Opcode Fuzzy Hash: fd7cc8dc33300e28ec206efda17457d71feb43ee51eae797dc888ef6a093873d
            • Instruction Fuzzy Hash: 112180754083809FCB02CF64D994B11BF71EB86614F28C5EAD8458F2A7C33AD856CB62
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279463067.000000000121D000.00000040.00000001.sdmp, Offset: 0121D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f56c5d28dc22c36c06b9c0244b20b8a5410b3a40b9b7180f2002089e4cc55e97
            • Instruction ID: d2cc66abeef5e092e19f3c0b925540457ae10e71c67cb11216761cc2530568a9
            • Opcode Fuzzy Hash: f56c5d28dc22c36c06b9c0244b20b8a5410b3a40b9b7180f2002089e4cc55e97
            • Instruction Fuzzy Hash: B9110376404284DFCF12CF54D5C4B16BFB1FB84324F24C6A9D9040B61AC336D45ACBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279516052.000000000133D000.00000040.00000001.sdmp, Offset: 0133D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction ID: cb1a87b9135211e185619dd156822da5586dc465509f56ddb98996c68ebadd45
            • Opcode Fuzzy Hash: 063f64e9f19c120be1bc5fbc0f54111dbe799593af5e5c271c3290cb6d0d3b48
            • Instruction Fuzzy Hash: 3C118B75504280DFDB12CF54D5C4B15BBB1FB84228F28C6A9D8498B656C33AD45ACB61
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279463067.000000000121D000.00000040.00000001.sdmp, Offset: 0121D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3a5c31e11174bf9cc15a23e3e53d485745ceb225f9a857b4e415e732bb9276f3
            • Instruction ID: 64e1b2f5d0790092950770258231032441659aaeeb0a181d2a7247b42ab42f72
            • Opcode Fuzzy Hash: 3a5c31e11174bf9cc15a23e3e53d485745ceb225f9a857b4e415e732bb9276f3
            • Instruction Fuzzy Hash: 7C01D471014288DAE7248A95CC8CBA7BFDCDF51274F08852AEE055A24AE3B89841CAB1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 0000000D.00000002.279463067.000000000121D000.00000040.00000001.sdmp, Offset: 0121D000, based on PE: false
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0b375d37bab99710ac076613adc7e0c8f593ed243e07f7305dadf3d73c15e653
            • Instruction ID: 17fe87da6918a10d8d6f83240241dbc4f9771cc4471a6d7b0db2425e062418f9
            • Opcode Fuzzy Hash: 0b375d37bab99710ac076613adc7e0c8f593ed243e07f7305dadf3d73c15e653
            • Instruction Fuzzy Hash: 67F0C2714042849AEB248F59CC88BA3FFDCEB81274F18C45AEE085F286D3789844CAB0
            Uniqueness

            Uniqueness Score: -1.00%

            Non-executed Functions