Loading ...

Play interactive tourEdit tour

Windows Analysis Report 4jE4gfofqX.exe

Overview

General Information

Sample Name:4jE4gfofqX.exe
Analysis ID:553323
MD5:39924fd67ad38b45a9f0871798074ec4
SHA1:9d8af43fbfe30f21c5f0e147ddc211efb67e71c6
SHA256:998746d0f5d0c13df720f0bf3981d652c828ea64d64d2e16736a80123fb534aa
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Powershell Defender Exclusion
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • 4jE4gfofqX.exe (PID: 3080 cmdline: "C:\Users\user\Desktop\4jE4gfofqX.exe" MD5: 39924FD67AD38B45A9F0871798074EC4)
    • powershell.exe (PID: 6240 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 7160 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5236 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 71369277D09DA0830C8C59F9E22BB23A)
      • schtasks.exe (PID: 5684 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp20C3.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6132 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp298E.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegSvcs.exe (PID: 6104 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 1324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6260 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 6276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5668 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • conhost.exe (PID: 6452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "5ddb4cba-37cb-41bf-8dbf-b2a0e345", "Domain1": "nsayers4rm382.bounceme.net", "Domain2": "127.0.0.1", "Port": 2050, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.688995010.00000000030B1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x1ad2:$a: NanoCore
    • 0x1af7:$a: NanoCore
    • 0x1b50:$a: NanoCore
    • 0x11ced:$a: NanoCore
    • 0x11d13:$a: NanoCore
    • 0x11d6f:$a: NanoCore
    • 0x1ebc4:$a: NanoCore
    • 0x1ec1d:$a: NanoCore
    • 0x1ec50:$a: NanoCore
    • 0x1ee7c:$a: NanoCore
    • 0x1eef8:$a: NanoCore
    • 0x1f511:$a: NanoCore
    • 0x1f65a:$a: NanoCore
    • 0x1fb2e:$a: NanoCore
    • 0x1fe15:$a: NanoCore
    • 0x1fe2c:$a: NanoCore
    • 0x253ca:$a: NanoCore
    • 0x25444:$a: NanoCore
    • 0x29fe1:$a: NanoCore
    • 0x2b39b:$a: NanoCore
    • 0x2b3e5:$a: NanoCore
    00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      Click to see the 20 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.3.RegSvcs.exe.48881c5.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x605:$x1: NanoCore.ClientPluginHost
      • 0x3bd6:$x1: NanoCore.ClientPluginHost
      • 0x63e:$x2: IClientNetworkHost
      7.3.RegSvcs.exe.48881c5.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x605:$x2: NanoCore.ClientPluginHost
      • 0x3bd6:$x2: NanoCore.ClientPluginHost
      • 0x720:$s4: PipeCreated
      • 0x3cb4:$s4: PipeCreated
      • 0x61f:$s5: IClientLoggingHost
      • 0x3bf0:$s5: IClientLoggingHost
      0.2.4jE4gfofqX.exe.42e7670.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.4jE4gfofqX.exe.42e7670.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      0.2.4jE4gfofqX.exe.42e7670.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 36 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5236, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5236, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
        Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\4jE4gfofqX.exe" , ParentImage: C:\Users\user\Desktop\4jE4gfofqX.exe, ParentProcessId: 3080, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5236
        Sigma detected: Suspicius Add Task From User AppData TempShow sources
        Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\4jE4gfofqX.exe" , ParentImage: C:\Users\user\Desktop\4jE4gfofqX.exe, ParentProcessId: 3080, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp, ProcessId: 7160
        Sigma detected: Powershell Defender ExclusionShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\4jE4gfofqX.exe" , ParentImage: C:\Users\user\Desktop\4jE4gfofqX.exe, ParentProcessId: 3080, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe, ProcessId: 6240
        Sigma detected: Possible Applocker BypassShow sources
        Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\4jE4gfofqX.exe" , ParentImage: C:\Users\user\Desktop\4jE4gfofqX.exe, ParentProcessId: 3080, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5236
        Sigma detected: Non Interactive PowerShellShow sources
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\4jE4gfofqX.exe" , ParentImage: C:\Users\user\Desktop\4jE4gfofqX.exe, ParentProcessId: 3080, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe, ProcessId: 6240
        Sigma detected: T1086 PowerShell ExecutionShow sources
        Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132866498556196356.6240.DefaultAppDomain.powershell

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5236, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5236, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "5ddb4cba-37cb-41bf-8dbf-b2a0e345", "Domain1": "nsayers4rm382.bounceme.net", "Domain2": "127.0.0.1", "Port": 2050, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Antivirus detection for URL or domainShow sources
        Source: nsayers4rm382.bounceme.netAvira URL Cloud: Label: malware
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: 4jE4gfofqX.exeJoe Sandbox ML: detected
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exeJoe Sandbox ML: detected
        Source: 7.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4jE4gfofqX.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
        Source: 4jE4gfofqX.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 00000013.00000000.710357979.0000000000F32000.00000002.00020000.sdmp, dhcpmon.exe.7.dr
        Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: nsayers4rm382.bounceme.net
        Source: Malware configuration extractorURLs: 127.0.0.1
        Source: Joe Sandbox ViewASN Name: SPD-NETTR SPD-NETTR
        Source: global trafficTCP traffic: 192.168.2.4:49776 -> 212.193.30.28:2050
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpString found in binary or memory: http://google.com
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com6
        Source: 4jE4gfofqX.exe, 00000000.00000003.653431280.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com8
        Source: 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653742457.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653687112.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com9
        Source: 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comCt
        Source: 4jE4gfofqX.exe, 00000000.00000003.653905958.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653742457.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653687112.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653806293.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653842716.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653871879.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comams
        Source: 4jE4gfofqX.exe, 00000000.00000003.653871879.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comcoF
        Source: 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653742457.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653687112.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653806293.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653842716.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comcoJ
        Source: 4jE4gfofqX.exe, 00000000.00000003.653905958.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comcooo
        Source: 4jE4gfofqX.exe, 00000000.00000003.653431280.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comen
        Source: 4jE4gfofqX.exe, 00000000.00000003.653431280.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comexce
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comnew
        Source: 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comng-
        Source: 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comona
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: 4jE4gfofqX.exe, 00000000.00000003.656909945.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.657784719.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: 4jE4gfofqX.exe, 00000000.00000003.658311603.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers%
        Source: 4jE4gfofqX.exe, 00000000.00000003.656622789.00000000053A8000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656703264.00000000053A8000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656736514.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers.
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: 4jE4gfofqX.exe, 00000000.00000003.656523842.00000000053A8000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/S
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.657214468.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: 4jE4gfofqX.exe, 00000000.00000003.657236775.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers3
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: 4jE4gfofqX.exe, 00000000.00000003.661693250.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.657756165.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656875320.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656909945.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersD
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: 4jE4gfofqX.exe, 00000000.00000003.657784719.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersI
        Source: 4jE4gfofqX.exe, 00000000.00000003.658414564.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.658381629.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.658451444.00000000053A5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersb
        Source: 4jE4gfofqX.exe, 00000000.00000003.683972284.0000000005370000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691407826.0000000005370000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com4
        Source: 4jE4gfofqX.exe, 00000000.00000003.683972284.0000000005370000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691407826.0000000005370000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com=
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com?
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsF
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomd
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comgI
        Source: 4jE4gfofqX.exe, 00000000.00000003.683972284.0000000005370000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691407826.0000000005370000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comsivau
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comueed
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comv
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651644316.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: 4jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com8
        Source: 4jE4gfofqX.exe, 00000000.00000003.651695593.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651727009.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc;MLD
        Source: 4jE4gfofqX.exe, 00000000.00000003.652974130.0000000005374000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: 4jE4gfofqX.exe, 00000000.00000003.652974130.0000000005374000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653172088.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn#
        Source: 4jE4gfofqX.exe, 00000000.00000003.653172088.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: 4jE4gfofqX.exe, 00000000.00000003.652958948.00000000053AD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn6
        Source: 4jE4gfofqX.exe, 00000000.00000003.653172088.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn8
        Source: 4jE4gfofqX.exe, 00000000.00000003.652958948.00000000053AD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cni-f
        Source: 4jE4gfofqX.exe, 00000000.00000003.659690845.000000000537D000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: 4jE4gfofqX.exe, 00000000.00000003.660243751.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/$
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: 4jE4gfofqX.exe, 00000000.00000003.651695593.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651727009.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651560991.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651590978.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651493614.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651519735.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651644316.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651616849.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651540012.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com6
        Source: 4jE4gfofqX.exe, 00000000.00000003.651695593.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651727009.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651560991.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651590978.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651493614.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651519735.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651644316.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651616849.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651540012.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comd
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: 4jE4gfofqX.exe, 00000000.00000003.652530008.0000000005379000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr.
        Source: 4jE4gfofqX.exe, 00000000.00000003.652530008.0000000005379000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krdD
        Source: 4jE4gfofqX.exe, 00000000.00000003.652530008.0000000005379000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krmark
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: 4jE4gfofqX.exe, 00000000.00000003.651960939.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comVM
        Source: 4jE4gfofqX.exe, 00000000.00000003.651960939.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comc
        Source: 4jE4gfofqX.exe, 00000000.00000003.651940295.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651960939.000000000538B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comna
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de.v
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: unknownDNS traffic detected: queries for: nsayers4rm382.bounceme.net
        Source: 4jE4gfofqX.exe, 00000000.00000002.688387463.0000000001130000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 7.3.RegSvcs.exe.48881c5.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.3.RegSvcs.exe.48881c5.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.3.RegSvcs.exe.4882799.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.3.RegSvcs.exe.486e16e.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4jE4gfofqX.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 7.3.RegSvcs.exe.48881c5.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.3.RegSvcs.exe.48881c5.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.3.RegSvcs.exe.48881c5.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.3.RegSvcs.exe.4882799.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.3.RegSvcs.exe.486e16e.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_02C123F80_2_02C123F8
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_02C131480_2_02C13148
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_02C101680_2_02C10168
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_02C15A160_2_02C15A16
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_02C145C00_2_02C145C0
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_02C1015A0_2_02C1015A
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_07080B8A NtQuerySystemInformation,0_2_07080B8A
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_07080B59 NtQuerySystemInformation,0_2_07080B59
        Source: 4jE4gfofqX.exe, 00000000.00000002.687789062.00000000009C0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameRemotingCachedDa.exe@ vs 4jE4gfofqX.exe
        Source: 4jE4gfofqX.exe, 00000000.00000002.692330944.0000000007290000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs 4jE4gfofqX.exe
        Source: 4jE4gfofqX.exe, 00000000.00000003.672021933.000000000424E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs 4jE4gfofqX.exe
        Source: 4jE4gfofqX.exe, 00000000.00000002.688387463.0000000001130000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs 4jE4gfofqX.exe
        Source: 4jE4gfofqX.exeBinary or memory string: OriginalFilenameRemotingCachedDa.exe@ vs 4jE4gfofqX.exe
        Source: 4jE4gfofqX.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: CGsmBdIfAIk.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile read: C:\Users\user\Desktop\4jE4gfofqX.exeJump to behavior
        Source: 4jE4gfofqX.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\4jE4gfofqX.exe "C:\Users\user\Desktop\4jE4gfofqX.exe"
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp20C3.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp298E.tmp
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exeJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmpJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp20C3.tmpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp298E.tmpJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_07080A0E AdjustTokenPrivileges,0_2_07080A0E
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_070809D7 AdjustTokenPrivileges,0_2_070809D7
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile created: C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exeJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC7DE.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@21/22@18/2
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5196:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7164:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{5ddb4cba-37cb-41bf-8dbf-b2a0e34526eb}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:740:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6452:120:WilError_01
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMutant created: \Sessions\1\BaseNamedObjects\zDAlfWpfrRUQEwrwXrJRDTJ
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6828:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6276:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1324:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
        Source: 4jE4gfofqX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: 4jE4gfofqX.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 00000013.00000000.710357979.0000000000F32000.00000002.00020000.sdmp, dhcpmon.exe.7.dr
        Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 4jE4gfofqX.exe, Form1.cs.Net Code: O0O0O System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: CGsmBdIfAIk.exe.0.dr, Form1.cs.Net Code: O0O0O System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.4jE4gfofqX.exe.950000.0.unpack, Form1.cs.Net Code: O0O0O System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.4jE4gfofqX.exe.950000.0.unpack, Form1.cs.Net Code: O0O0O System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeCode function: 0_2_02C1842B push ebp; iretd 0_2_02C1842C
        Source: initial sampleStatic PE information: section name: .text entropy: 7.90399867909
        Source: initial sampleStatic PE information: section name: .text entropy: 7.90399867909
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeFile created: C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.30c83ac.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.688995010.00000000030B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: 4jE4gfofqX.exe, 00000000.00000002.688995010.00000000030B1000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: 4jE4gfofqX.exe, 00000000.00000002.688995010.00000000030B1000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\4jE4gfofqX.exe TID: 4632Thread sleep time: -35058s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exe TID: 4596Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4788Thread sleep time: -9223372036854770s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5180Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4492Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6872Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1648Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 587Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 688Jump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeThread delayed: delay time: 35058Jump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: 4jE4gfofqX.exe, 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
        Source: 4jE4gfofqX.exe, 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: 4jE4gfofqX.exe, 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: 4jE4gfofqX.exe, 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000Jump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000Jump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000Jump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: E4A008Jump to behavior
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
        Adds a directory exclusion to Windows DefenderShow sources
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exeJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exeJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmpJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp20C3.tmpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp298E.tmpJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\4jE4gfofqX.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: 4jE4gfofqX.exe, 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
        Source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
        Source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
        Source: RegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
        Source: RegSvcs.exe, 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42e7670.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.4jE4gfofqX.exe.42b4a50.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4jE4gfofqX.exe PID: 3080, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5236, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Access Token Manipulation1Masquerading2Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection211Disable or Modify Tools11LSASS MemorySecurity Software Discovery111Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection211LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing13/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553323 Sample: 4jE4gfofqX.exe Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 58 nsayers4rm382.bounceme.net 2->58 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus detection for URL or domain 2->68 70 12 other signatures 2->70 9 4jE4gfofqX.exe 7 2->9         started        13 RegSvcs.exe 4 2->13         started        15 dhcpmon.exe 2->15         started        17 dhcpmon.exe 2->17         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\CGsmBdIfAIk.exe, PE32 9->50 dropped 52 C:\Users\...\CGsmBdIfAIk.exe:Zone.Identifier, ASCII 9->52 dropped 54 C:\Users\user\AppData\Local\...\tmpC7DE.tmp, XML 9->54 dropped 56 C:\Users\user\AppData\...\4jE4gfofqX.exe.log, ASCII 9->56 dropped 74 Uses schtasks.exe or at.exe to add and modify task schedules 9->74 76 Writes to foreign memory regions 9->76 78 Adds a directory exclusion to Windows Defender 9->78 80 Injects a PE file into a foreign processes 9->80 19 RegSvcs.exe 1 17 9->19         started        24 powershell.exe 25 9->24         started        26 schtasks.exe 1 9->26         started        28 conhost.exe 13->28         started        30 conhost.exe 15->30         started        32 conhost.exe 17->32         started        signatures6 process7 dnsIp8 60 nsayers4rm382.bounceme.net 212.193.30.28, 2050, 49776, 49777 SPD-NETTR Russian Federation 19->60 62 192.168.2.1 unknown unknown 19->62 46 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 19->46 dropped 48 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->48 dropped 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->72 34 schtasks.exe 1 19->34         started        36 schtasks.exe 1 19->36         started        38 conhost.exe 24->38         started        40 conhost.exe 26->40         started        file9 signatures10 process11 process12 42 conhost.exe 34->42         started        44 conhost.exe 36->44         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        4jE4gfofqX.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        7.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.fonts.comc;MLD0%Avira URL Cloudsafe
        http://www.fontbureau.comsivau0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.sajatypeworks.com60%Avira URL Cloudsafe
        http://www.carterandcone.comams0%URL Reputationsafe
        http://www.sandoll.co.kr.0%Avira URL Cloudsafe
        http://www.carterandcone.comen0%URL Reputationsafe
        http://www.tiro.comna0%Avira URL Cloudsafe
        http://www.fontbureau.comgI0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.sandoll.co.krdD0%Avira URL Cloudsafe
        http://www.carterandcone.com60%Avira URL Cloudsafe
        http://www.tiro.comVM0%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.fontbureau.comalsF0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.carterandcone.comCt0%Avira URL Cloudsafe
        http://www.carterandcone.com90%URL Reputationsafe
        http://www.carterandcone.com80%URL Reputationsafe
        http://www.fontbureau.com40%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.carterandcone.comnew0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sajatypeworks.comd0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.carterandcone.comexce0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.carterandcone.comcooo0%Avira URL Cloudsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.comueed0%URL Reputationsafe
        http://www.fontbureau.com=0%Avira URL Cloudsafe
        127.0.0.10%Avira URL Cloudsafe
        nsayers4rm382.bounceme.net100%Avira URL Cloudmalware
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.carterandcone.comng-0%Avira URL Cloudsafe
        http://www.fontbureau.comcomd0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cni-f0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn60%URL Reputationsafe
        http://www.founder.com.cn/cn80%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.carterandcone.comona0%URL Reputationsafe
        http://www.sandoll.co.krmark0%Avira URL Cloudsafe
        http://www.fontbureau.comv0%URL Reputationsafe
        http://www.carterandcone.comcoF0%Avira URL Cloudsafe
        http://www.tiro.comc0%URL Reputationsafe
        http://www.galapagosdesign.com/$0%Avira URL Cloudsafe
        http://www.urwpp.de.v0%Avira URL Cloudsafe
        http://www.fonts.com80%URL Reputationsafe
        http://www.carterandcone.comcoJ0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn#0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        nsayers4rm382.bounceme.net
        212.193.30.28
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          127.0.0.1true
          • Avira URL Cloud: safe
          unknown
          nsayers4rm382.bounceme.nettrue
          • Avira URL Cloud: malware
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.fontbureau.com/designersI4jE4gfofqX.exe, 00000000.00000003.657784719.00000000053A5000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designersG4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
              high
              http://www.fonts.comc;MLD4jE4gfofqX.exe, 00000000.00000003.651695593.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651727009.000000000538B000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.fontbureau.com/designers/?4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.comsivau4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.founder.com.cn/cn/bThe4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.com64jE4gfofqX.exe, 00000000.00000003.651695593.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651727009.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651560991.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651590978.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651493614.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651519735.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651644316.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651616849.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651540012.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers?4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                  high
                  http://www.carterandcone.comams4jE4gfofqX.exe, 00000000.00000003.653905958.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653742457.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653687112.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653806293.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653842716.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653871879.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designersD4jE4gfofqX.exe, 00000000.00000003.661693250.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.657756165.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656875320.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656909945.00000000053A5000.00000004.00000001.sdmpfalse
                    high
                    http://www.sandoll.co.kr.4jE4gfofqX.exe, 00000000.00000003.652530008.0000000005379000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comen4jE4gfofqX.exe, 00000000.00000003.653431280.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comna4jE4gfofqX.exe, 00000000.00000003.651940295.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651960939.000000000538B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comgI4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.com4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.krdD4jE4gfofqX.exe, 00000000.00000003.652530008.0000000005379000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.com64jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comVM4jE4gfofqX.exe, 00000000.00000003.651960939.000000000538B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers4jE4gfofqX.exe, 00000000.00000003.656909945.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.657784719.00000000053A5000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.kr4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://google.comRegSvcs.exe, 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comalsF4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.com4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netD4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cThe4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htm4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.com4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comCt4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.com94jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653742457.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653687112.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.com84jE4gfofqX.exe, 00000000.00000003.653431280.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com44jE4gfofqX.exe, 00000000.00000003.683972284.0000000005370000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691407826.0000000005370000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designersb4jE4gfofqX.exe, 00000000.00000003.658414564.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.658381629.00000000053A5000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.658451444.00000000053A5000.00000004.00000001.sdmpfalse
                          high
                          http://www.galapagosdesign.com/DPlease4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comnew4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.com4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651644316.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.kr4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comd4jE4gfofqX.exe, 00000000.00000003.651695593.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651727009.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651560991.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651590978.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651493614.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651519735.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651644316.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651616849.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651540012.000000000538B000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPlease4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comexce4jE4gfofqX.exe, 00000000.00000003.653431280.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.zhongyicts.com.cn4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comcooo4jE4gfofqX.exe, 00000000.00000003.653905958.00000000053AE000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sakkal.com4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comueed4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com=4jE4gfofqX.exe, 00000000.00000003.683972284.0000000005370000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691407826.0000000005370000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.fontbureau.com?4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                              high
                              http://www.apache.org/licenses/LICENSE-2.04jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.com4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.galapagosdesign.com/4jE4gfofqX.exe, 00000000.00000003.659690845.000000000537D000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comng-4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.fontbureau.comcomd4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.coml4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/4jE4gfofqX.exe, 00000000.00000003.653172088.0000000005374000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlN4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn4jE4gfofqX.exe, 00000000.00000003.652974130.0000000005374000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-user.html4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.657214468.00000000053A5000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cni-f4jE4gfofqX.exe, 00000000.00000003.652958948.00000000053AD000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers/S4jE4gfofqX.exe, 00000000.00000003.656523842.00000000053A8000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn64jE4gfofqX.exe, 00000000.00000003.652958948.00000000053AD000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn84jE4gfofqX.exe, 00000000.00000003.653172088.0000000005374000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers%4jE4gfofqX.exe, 00000000.00000003.658311603.00000000053A5000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/4jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.como4jE4gfofqX.exe, 00000000.00000003.683972284.0000000005370000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000002.691407826.0000000005370000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comona4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653488651.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653458673.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653587172.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653532200.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653511866.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653562017.00000000053AE000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers84jE4gfofqX.exe, 00000000.00000002.691900037.0000000006642000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.sandoll.co.krmark4jE4gfofqX.exe, 00000000.00000003.652530008.0000000005379000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.comv4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comcoF4jE4gfofqX.exe, 00000000.00000003.653871879.00000000053AE000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.tiro.comc4jE4gfofqX.exe, 00000000.00000003.651960939.000000000538B000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/$4jE4gfofqX.exe, 00000000.00000003.660243751.0000000005374000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.urwpp.de.v4jE4gfofqX.exe, 00000000.00000003.658563423.0000000005374000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fonts.com84jE4gfofqX.exe, 00000000.00000003.651663774.000000000538B000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers.4jE4gfofqX.exe, 00000000.00000003.656622789.00000000053A8000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656703264.00000000053A8000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.656736514.00000000053A5000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.carterandcone.comcoJ4jE4gfofqX.exe, 00000000.00000003.653660383.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653742457.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653687112.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653806293.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653842716.00000000053AE000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653630017.00000000053AE000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.founder.com.cn/cn#4jE4gfofqX.exe, 00000000.00000003.652974130.0000000005374000.00000004.00000001.sdmp, 4jE4gfofqX.exe, 00000000.00000003.653172088.0000000005374000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers34jE4gfofqX.exe, 00000000.00000003.657236775.00000000053A5000.00000004.00000001.sdmpfalse
                                                high

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                212.193.30.28
                                                nsayers4rm382.bounceme.netRussian Federation
                                                57844SPD-NETTRtrue

                                                Private

                                                IP
                                                192.168.2.1

                                                General Information

                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:553323
                                                Start date:14.01.2022
                                                Start time:17:03:16
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 8m 50s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Sample file name:4jE4gfofqX.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:30
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@21/22@18/2
                                                EGA Information:
                                                • Successful, ratio: 25%
                                                HDC Information:
                                                • Successful, ratio: 6.1% (good quality ratio 4.4%)
                                                • Quality average: 46%
                                                • Quality standard deviation: 33.6%
                                                HCA Information:
                                                • Successful, ratio: 83%
                                                • Number of executed functions: 90
                                                • Number of non-executed functions: 2
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe
                                                Warnings:
                                                Show All
                                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200
                                                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, dual-a-0001.dc-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                • Execution Graph export aborted for target RegSvcs.exe, PID 6104 because it is empty
                                                • Execution Graph export aborted for target dhcpmon.exe, PID 5668 because it is empty
                                                • Execution Graph export aborted for target dhcpmon.exe, PID 6260 because it is empty
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: 4jE4gfofqX.exe

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                17:04:11API Interceptor1x Sleep call for process: 4jE4gfofqX.exe modified
                                                17:04:18API Interceptor30x Sleep call for process: powershell.exe modified
                                                17:04:25AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                17:04:26Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" s>$(Arg0)
                                                17:04:28API Interceptor833x Sleep call for process: RegSvcs.exe modified
                                                17:04:29Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

                                                Joe Sandbox View / Context

                                                IPs

                                                No context

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                nsayers4rm382.bounceme.netPO-DOC_MDR0307_019.docGet hashmaliciousBrowse
                                                • 212.192.246.251
                                                AwgHpwrCpq.exeGet hashmaliciousBrowse
                                                • 212.192.246.251
                                                0mZjjqlN05.exeGet hashmaliciousBrowse
                                                • 2.56.56.102

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                SPD-NETTRkGl1qp3Ox8.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                vlWhzfX28h.exeGet hashmaliciousBrowse
                                                • 212.193.30.54
                                                6E52D162BAF265E070EC1A3147AD651D8BD8481D96B33.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                8VQte92zRKGet hashmaliciousBrowse
                                                • 85.153.23.181
                                                149_setupInstaller.exeGet hashmaliciousBrowse
                                                • 212.193.30.45
                                                3A6CA6A75525505890DC5D13AB3D888135B1CB4922605.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                00B5C410D204D6A92F6636E23998777D2716E8928F96B.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                ACAs6Kprey.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                VmIzagkjCN.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                3AXhCF0wwC.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                G4aYlYk5Vp.exeGet hashmaliciousBrowse
                                                • 212.193.30.45
                                                7WQadnF0l1.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                28043B9D96A6D54044950BCA23633AB601DCFDBE4305B.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                nUkbOfIFrC.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                WhCaRe7XsR.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                eiqhremk1t.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                8TDgYQyI5F.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                eIuCCBM8qo.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                HqOcQxewKw.exeGet hashmaliciousBrowse
                                                • 212.193.30.29
                                                3aqBu0K62x.exeGet hashmaliciousBrowse
                                                • 212.193.30.29

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAwgHpwrCpq.exeGet hashmaliciousBrowse
                                                  bVaVXUa32p.exeGet hashmaliciousBrowse
                                                    9hNhQ1Em5mRIPMT.exeGet hashmaliciousBrowse
                                                      6s8bYTsVOVp90OM.exeGet hashmaliciousBrowse
                                                        6HCcByDANQXSGRX.exeGet hashmaliciousBrowse
                                                          PO_783992883.exeGet hashmaliciousBrowse
                                                            NGBCB21034772.exeGet hashmaliciousBrowse
                                                              z.exeGet hashmaliciousBrowse
                                                                83Vbz4Ws7e.exeGet hashmaliciousBrowse
                                                                  qF1xeOlWMA.exeGet hashmaliciousBrowse
                                                                    3EhG7plOed.exeGet hashmaliciousBrowse
                                                                      GHhMZFFEmf.exeGet hashmaliciousBrowse
                                                                        DRAFT BL-DOCS-20211510-VP-KMC022021.exeGet hashmaliciousBrowse
                                                                          b2ZeLApyX2.exeGet hashmaliciousBrowse
                                                                            YKr3m9a7C3.exeGet hashmaliciousBrowse
                                                                              tEdxwnE4lw.exeGet hashmaliciousBrowse
                                                                                87R65JT93I.exeGet hashmaliciousBrowse
                                                                                  invo.exeGet hashmaliciousBrowse
                                                                                    U5s97oQj9A.exeGet hashmaliciousBrowse
                                                                                      hAmgDpjdg5.exeGet hashmaliciousBrowse

                                                                                        Created / dropped Files

                                                                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):32768
                                                                                        Entropy (8bit):3.7515815714465193
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:BOj9Y8/gS7SDriLGKq1MHR5U4Ag6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgWSW72uw:B+gSAdN1MH3HAFRJngW2u
                                                                                        MD5:71369277D09DA0830C8C59F9E22BB23A
                                                                                        SHA1:37F9781314F0F6B7E9CB529A573F2B1C8DE9E93F
                                                                                        SHA-256:D4527B7AD2FC4778CC5BE8709C95AEA44EAC0568B367EE14F7357D72898C3698
                                                                                        SHA-512:2F470383E3C796C4CF212EC280854DBB9E7E8C8010CE6857E58F8E7066D7516B7CD7039BC5C0F547E1F5C7F9F2287869ADFFB2869800B08B2982A88BE96E9FB7
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: AwgHpwrCpq.exe, Detection: malicious, Browse
                                                                                        • Filename: bVaVXUa32p.exe, Detection: malicious, Browse
                                                                                        • Filename: 9hNhQ1Em5mRIPMT.exe, Detection: malicious, Browse
                                                                                        • Filename: 6s8bYTsVOVp90OM.exe, Detection: malicious, Browse
                                                                                        • Filename: 6HCcByDANQXSGRX.exe, Detection: malicious, Browse
                                                                                        • Filename: PO_783992883.exe, Detection: malicious, Browse
                                                                                        • Filename: NGBCB21034772.exe, Detection: malicious, Browse
                                                                                        • Filename: z.exe, Detection: malicious, Browse
                                                                                        • Filename: 83Vbz4Ws7e.exe, Detection: malicious, Browse
                                                                                        • Filename: qF1xeOlWMA.exe, Detection: malicious, Browse
                                                                                        • Filename: 3EhG7plOed.exe, Detection: malicious, Browse
                                                                                        • Filename: GHhMZFFEmf.exe, Detection: malicious, Browse
                                                                                        • Filename: DRAFT BL-DOCS-20211510-VP-KMC022021.exe, Detection: malicious, Browse
                                                                                        • Filename: b2ZeLApyX2.exe, Detection: malicious, Browse
                                                                                        • Filename: YKr3m9a7C3.exe, Detection: malicious, Browse
                                                                                        • Filename: tEdxwnE4lw.exe, Detection: malicious, Browse
                                                                                        • Filename: 87R65JT93I.exe, Detection: malicious, Browse
                                                                                        • Filename: invo.exe, Detection: malicious, Browse
                                                                                        • Filename: U5s97oQj9A.exe, Detection: malicious, Browse
                                                                                        • Filename: hAmgDpjdg5.exe, Detection: malicious, Browse
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.................P... .......k... ........@.. ...............................[....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\4jE4gfofqX.exe.log
                                                                                        Process:C:\Users\user\Desktop\4jE4gfofqX.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):659
                                                                                        Entropy (8bit):5.2661344468761735
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70U2U/N0Ug+9Yz9tv:MLF20NaL329hJ5g522rW2U/Pz2T
                                                                                        MD5:3C153E5BCCA87FF6E091634EE977299F
                                                                                        SHA1:6DE85803E7FA00C03CE809243EB8162DF036430A
                                                                                        SHA-256:F0705BDCE38ADB33CA8B414DDB85718985660BC73E0BE4439E0A94384A37797D
                                                                                        SHA-512:54BDFFA72A0D4122B5B79B092D7E8C3213EB30AE2858188748E52ADD65ADE2F2F887892C06BB8ED790C19F1ED949176B9A9F0113679EF38B74387A189E6DC745
                                                                                        Malicious:true
                                                                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Transactions\aa840ffb0dd775d9eb8d66c8a8e8cdd9\System.Transactions.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegSvcs.exe.log
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):120
                                                                                        Entropy (8bit):5.016405576253028
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                        MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                        SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                        SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                        SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                        Malicious:false
                                                                                        Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):120
                                                                                        Entropy (8bit):5.016405576253028
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:QHXMKaoWglAFXMWA2yTMGfsbNXLVd49Am12MFuAvOAsDeieVyn:Q3LawlAFXMWTyAGCFLIP12MUAvvrs
                                                                                        MD5:50DEC1858E13F033E6DCA3CBFAD5E8DE
                                                                                        SHA1:79AE1E9131B0FAF215B499D2F7B4C595AA120925
                                                                                        SHA-256:14A557E226E3BA8620BB3A70035E1E316F1E9FB5C9E8F74C07110EE90B8D8AE4
                                                                                        SHA-512:1BD73338DF685A5B57B0546E102ECFDEE65800410D6F77845E50456AC70DE72929088AF19B59647F01CBA7A5ACFB399C52D9EF2402A9451366586862EF88E7BF
                                                                                        Malicious:false
                                                                                        Preview: 1,"fusion","GAC",0..2,"System.EnterpriseServices, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                        C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):22272
                                                                                        Entropy (8bit):5.6028179508540195
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:2tCDLG0vHVY1gG/SCaRnYS0nMjultI+v7Y9g9SJ3xOT1Ma7ZlbAV7lWwiZBDI+iN:lm1gEmYTMClthf9cUCafwkVE
                                                                                        MD5:8CD4C69E7735A00B8E656FE76E0C58CE
                                                                                        SHA1:F00BF1617BDD92B97E01FC7B20F6AE643ED7E21C
                                                                                        SHA-256:568FC21DD09C9AE03E7988BA06BD1951D18CE1215C9A7B632496AB34DC22C17E
                                                                                        SHA-512:4BF9A4D8702E1F6C8997C1EE46A77E1E4B6C9519448E614B4908C694A885DB2F4E776156F5E4CB264E9E7ECB4F1A286D11138E5321DC87A2760BA5C26641C47A
                                                                                        Malicious:false
                                                                                        Preview: @...e...........y.......h.............X...I..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                                        C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l2tajiaq.gs0.ps1
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:very short file (no magic)
                                                                                        Category:dropped
                                                                                        Size (bytes):1
                                                                                        Entropy (8bit):0.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:U:U
                                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                        Malicious:false
                                                                                        Preview: 1
                                                                                        C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ocbsmtkp.ghy.psm1
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:very short file (no magic)
                                                                                        Category:dropped
                                                                                        Size (bytes):1
                                                                                        Entropy (8bit):0.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:U:U
                                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                        Malicious:false
                                                                                        Preview: 1
                                                                                        C:\Users\user\AppData\Local\Temp\tmp20C3.tmp
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1320
                                                                                        Entropy (8bit):5.135021273392143
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mn4xtn:cbk4oL600QydbQxIYODOLedq3Z4j
                                                                                        MD5:40B11EF601FB28F9B2E69D36857BF2EC
                                                                                        SHA1:B6454020AD2CEED193F4792B77001D0BD741B370
                                                                                        SHA-256:C51E12D18CC664425F6711D8AE2507068884C7057092CFA11884100E1E9D49E1
                                                                                        SHA-512:E3C5BCC714CBFCA4B8058DDCDDF231DCEFA69C15881CE3F8123E59ED45CFB5DA052B56E1945DCF8DC7F800D62F9A4EECB82BCA69A66A1530787AEFFEB15E2BD5
                                                                                        Malicious:false
                                                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                        C:\Users\user\AppData\Local\Temp\tmp298E.tmp
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1310
                                                                                        Entropy (8bit):5.109425792877704
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                        MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                        SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                        SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                        SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                        Malicious:false
                                                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                        C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp
                                                                                        Process:C:\Users\user\Desktop\4jE4gfofqX.exe
                                                                                        File Type:XML 1.0 document, ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):1598
                                                                                        Entropy (8bit):5.139234187632499
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaNxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTIv
                                                                                        MD5:C9924CDB058AE4F5ED4B8AE833BEB87E
                                                                                        SHA1:064062D7979E05C27A0D8398DA876D7203D7F1F6
                                                                                        SHA-256:54F27E662692D9D4BA3B6891459A6E3E5467A16DA5C31F970B8BB9B97C405328
                                                                                        SHA-512:2537A55087D464B1EB5E914BC3BBACFA08F666BEB74A9A999D9CF015CD225775FB32E70B4C8246FD298AF3F5C9A7577B88FC600356D1F8100A4EEDB48390AF93
                                                                                        Malicious:true
                                                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                                                        C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe
                                                                                        Process:C:\Users\user\Desktop\4jE4gfofqX.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):445952
                                                                                        Entropy (8bit):7.8925106493683295
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:iUcPAwUnh8+ZujiTkUe4a7sSGRfjQ2q8hrTaK9GMoqC:Dcv07ZmiTrnkGRM2/GKGqC
                                                                                        MD5:39924FD67AD38B45A9F0871798074EC4
                                                                                        SHA1:9D8AF43FBFE30F21C5F0E147DDC211EFB67E71C6
                                                                                        SHA-256:998746D0F5D0C13DF720F0BF3981D652C828EA64D64D2E16736A80123FB534AA
                                                                                        SHA-512:A77D009F8AA88F6CD0BC428219075169B495A16417AA3768E9D5BE20635F5DD785DBFE1B7F23CC8B37E841FC4F354EA07157970487D4EC29600F6CA56A697A96
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....a..............0.............~.... ........@.. .......................@............@.................................,...O............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................`.......H.......,]...m......,...$...............................................".(.....*....0..G.............E....................+ ~.....+ ~.....+.~.....+.~.....+.~.....+..*..0............E...%.r...p.%.r...p.%.r%..p.%.r7..p........E...%.rI..p.%.r[..p.%.r%..p.%.r7..p........E...%.r...p.%.rm..p.%.r...p.%.r...p........E...%.r...p.%.r...p.%.r...p.%.r...p......r...p.......E...%.rr..p.%.r...p.%.r...p.%.r...p......*B.(........}....*..0..1........(.......(.............h5...b.&+...h;....8..
                                                                                        C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe:Zone.Identifier
                                                                                        Process:C:\Users\user\Desktop\4jE4gfofqX.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):26
                                                                                        Entropy (8bit):3.95006375643621
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:ggPYV:rPYV
                                                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                        Malicious:true
                                                                                        Preview: [ZoneTransfer]....ZoneId=0
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):232
                                                                                        Entropy (8bit):7.024371743172393
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                                                                        MD5:32D0AAE13696FF7F8AF33B2D22451028
                                                                                        SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                                                                        SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                                                                        SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                                                                        Malicious:false
                                                                                        Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):8
                                                                                        Entropy (8bit):3.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Ey:Ey
                                                                                        MD5:DB32428FAED7BD0F8E9D84E5294DCA75
                                                                                        SHA1:D840FF4CDF74027CE72EA3CE3954ACB9843E37AB
                                                                                        SHA-256:DA6FA2B36D2081EBA6FB0AB2A094DA77942C12B77D72F6B4EF60AE2F6C990949
                                                                                        SHA-512:46C91D972ED944BD18B2504325DA7EECFA5EF1D6F268B4F77431FF6E977C52F2FDE3F1892265928D4714ECB31B079E6EE5F8936CADA68972F404D7700D589684
                                                                                        Malicious:true
                                                                                        Preview: |.,.w..H
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):24
                                                                                        Entropy (8bit):4.584962500721156
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:9bzY6oRDJoTBn:RzWDqTB
                                                                                        MD5:3FCC766D28BFD974C68B38C27D0D7A9A
                                                                                        SHA1:45ED19A78D9B79E46EDBFC3E3CA58E90423A676B
                                                                                        SHA-256:39A25F1AB5099005A74CF04F3C61C3253CD9BDA73B85228B58B45AAA4E838641
                                                                                        SHA-512:C7D47BDAABEEBB8C9D9B31CC4CE968EAF291771762FA022A2F55F9BA4838E71FDBD3F83792709E47509C5D94629D6D274CC933371DC01560D13016D944012DA5
                                                                                        Malicious:false
                                                                                        Preview: 9iH...}Z.4..f.....l.d
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):40
                                                                                        Entropy (8bit):5.221928094887364
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
                                                                                        MD5:AE0F5E6CE7122AF264EC533C6B15A27B
                                                                                        SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
                                                                                        SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
                                                                                        SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
                                                                                        Malicious:false
                                                                                        Preview: 9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):426840
                                                                                        Entropy (8bit):7.999608491116724
                                                                                        Encrypted:true
                                                                                        SSDEEP:12288:zKf137EiDsTjevgA4p0V7njXuWSvdVU7V4OC0Rr:+134i2lp67i5d8+OCg
                                                                                        MD5:963D5E2C9C0008DFF05518B47C367A7F
                                                                                        SHA1:C183D601FABBC9AC8FBFA0A0937DECC677535E74
                                                                                        SHA-256:5EACF2974C9BB2C2E24CDC651C4840DD6F4B76A98F0E85E90279F1DBB2E6F3C0
                                                                                        SHA-512:0C04E1C1A13070D48728D9F7F300D9B26DEC6EC8875D8D3017EAD52B9EE5BDF9B651A7F0FCC537761212831107646ED72B8ED017E7477E600BC0137EF857AE2C
                                                                                        Malicious:false
                                                                                        Preview: ..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):57
                                                                                        Entropy (8bit):4.795707286467131
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:oMty8WbSX/MNn:oMLWus
                                                                                        MD5:D685103573539B7E9FDBF5F1D7DD96CE
                                                                                        SHA1:4B2FE6B5C0B37954B314FCAEE1F12237A9B02D07
                                                                                        SHA-256:D78BC23B0CA3EDDF52D56AB85CDC30A71B3756569CB32AA2F6C28DBC23C76E8E
                                                                                        SHA-512:17769A5944E8929323A34269ABEEF0861D5C6799B0A27F5545FBFADC80E5AB684A471AD6F6A7FC623002385154EA89DE94013051E09120AB94362E542AB0F1DD
                                                                                        Malicious:false
                                                                                        Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        C:\Users\user\Documents\20220114\PowerShell_transcript.105270.F8elBDBn.20220114170416.txt
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):5793
                                                                                        Entropy (8bit):5.397620486346515
                                                                                        Encrypted:false
                                                                                        SSDEEP:96:BZ4jVNqqDo1ZEZyjVNqqDo1ZXThrjZ0gjVNqqDo1ZeibbYZT:tC
                                                                                        MD5:6DD6D9C7E7FE1FB610443D3993CD36A2
                                                                                        SHA1:C09861D529FD1EF0A1CA5402DC478D528CB7650D
                                                                                        SHA-256:F6BE896EB0BAE1A3217F39DE59EF00DBA13346EAFD4066F2BFC1F78F4F8B7198
                                                                                        SHA-512:0FE3E12DF4F9CCB073E1E52B091DD285B7FC9DDC779B1DAF10C45C58BF682714BA0012B897076DC8F96E3F666829A76950654BEAD2DAB1184F3B6A38F24E4A76
                                                                                        Malicious:false
                                                                                        Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114170417..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 105270 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe..Process ID: 6240..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220114170417..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe..**********************..Windows PowerShell transcript start..Start time: 20220114170820..Username: computer\user..RunAs User: computer\jo
                                                                                        \Device\ConDrv
                                                                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1145
                                                                                        Entropy (8bit):4.462201512373672
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:zKLXkzPDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0zPDQntKKH1MqJC
                                                                                        MD5:46EBEB88876A00A52CC37B1F8E0D0438
                                                                                        SHA1:5E5DB352F964E5F398301662FF558BD905798A65
                                                                                        SHA-256:D65BD5A6CC112838AFE8FA70BF61FD13C1313BCE3EE3E76C50E454D7B581238B
                                                                                        SHA-512:E713E6F304A469FB71235C598BC7E2C6F8458ABC61DAF3D1F364F66579CAFA4A7F3023E585BDA552FB400009E7805A8CA0311A50D5EDC9C2AD2D067772A071BE
                                                                                        Malicious:false
                                                                                        Preview: Microsoft (R) .NET Framework Services Installation Utility Version 2.0.50727.8922..Copyright (c) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output...

                                                                                        Static File Info

                                                                                        General

                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.8925106493683295
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        File name:4jE4gfofqX.exe
                                                                                        File size:445952
                                                                                        MD5:39924fd67ad38b45a9f0871798074ec4
                                                                                        SHA1:9d8af43fbfe30f21c5f0e147ddc211efb67e71c6
                                                                                        SHA256:998746d0f5d0c13df720f0bf3981d652c828ea64d64d2e16736a80123fb534aa
                                                                                        SHA512:a77d009f8aa88f6cd0bc428219075169b495a16417aa3768e9d5be20635f5dd785dbfe1b7f23cc8b37e841fc4f354ea07157970487d4ec29600f6ca56a697a96
                                                                                        SSDEEP:12288:iUcPAwUnh8+ZujiTkUe4a7sSGRfjQ2q8hrTaK9GMoqC:Dcv07ZmiTrnkGRM2/GKGqC
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0.............~.... ........@.. .......................@............@................................

                                                                                        File Icon

                                                                                        Icon Hash:00828e8e8686b000

                                                                                        Static PE Info

                                                                                        General

                                                                                        Entrypoint:0x46e37e
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                        Time Stamp:0x61E18ED8 [Fri Jan 14 14:55:20 2022 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:v2.0.50727
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                        Entrypoint Preview

                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al

                                                                                        Data Directories

                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6e32c0x4f.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x5e4.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                        Sections

                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000x6c3840x6c400False0.917842450924data7.90399867909IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x700000x5e40x600False0.4296875data4.16236823097IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x720000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                        Resources

                                                                                        NameRVASizeTypeLanguageCountry
                                                                                        RT_VERSION0x700900x354data
                                                                                        RT_MANIFEST0x703f40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                        Imports

                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain

                                                                                        Version Infos

                                                                                        DescriptionData
                                                                                        Translation0x0000 0x04b0
                                                                                        LegalCopyrightCopyright 2018
                                                                                        Assembly Version1.0.0.0
                                                                                        InternalNameRemotingCachedDa.exe
                                                                                        FileVersion1.0.0.0
                                                                                        CompanyName
                                                                                        LegalTrademarks
                                                                                        Comments
                                                                                        ProductNamePortrait Editor
                                                                                        ProductVersion1.0.0.0
                                                                                        FileDescriptionPortrait Editor
                                                                                        OriginalFilenameRemotingCachedDa.exe

                                                                                        Network Behavior

                                                                                        Snort IDS Alerts

                                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                        01/14/22-17:04:29.027612UDP254DNS SPOOF query response with TTL of 1 min. and no authority53545318.8.8.8192.168.2.4
                                                                                        01/14/22-17:04:42.016659UDP254DNS SPOOF query response with TTL of 1 min. and no authority53530978.8.8.8192.168.2.4
                                                                                        01/14/22-17:05:00.517356UDP254DNS SPOOF query response with TTL of 1 min. and no authority53558548.8.8.8192.168.2.4
                                                                                        01/14/22-17:05:26.047805UDP254DNS SPOOF query response with TTL of 1 min. and no authority53617218.8.8.8192.168.2.4
                                                                                        01/14/22-17:05:32.163170UDP254DNS SPOOF query response with TTL of 1 min. and no authority53512558.8.8.8192.168.2.4
                                                                                        01/14/22-17:05:50.086098UDP254DNS SPOOF query response with TTL of 1 min. and no authority53550468.8.8.8192.168.2.4
                                                                                        01/14/22-17:06:01.948967UDP254DNS SPOOF query response with TTL of 1 min. and no authority53506018.8.8.8192.168.2.4
                                                                                        01/14/22-17:06:13.810038UDP254DNS SPOOF query response with TTL of 1 min. and no authority53591728.8.8.8192.168.2.4

                                                                                        Network Port Distribution

                                                                                        TCP Packets

                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jan 14, 2022 17:04:29.037033081 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.065347910 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.065469027 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.148545027 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.192070007 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.193619013 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.285008907 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.285151958 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.313910961 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.357578039 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.364716053 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.457014084 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.516365051 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.597579002 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.600389004 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.691261053 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.733191013 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.754010916 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.754054070 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.754091978 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.754111052 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.754131079 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.754138947 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.754174948 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.754210949 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.781706095 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.781749964 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.781789064 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.781826973 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.781827927 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.781877041 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.781893969 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.781934977 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.781971931 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.781982899 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.782011032 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.782099009 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.808867931 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.808909893 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.808948040 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.808974981 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.808985949 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809025049 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809045076 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.809063911 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809103012 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809120893 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.809142113 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809179068 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809192896 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.809217930 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809257030 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809293032 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809314013 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.809334993 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809348106 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.809374094 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809413910 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809453011 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.809467077 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.809506893 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.815330029 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836512089 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836555958 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836592913 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836622953 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836637020 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836652994 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836680889 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836688042 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836720943 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836729050 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836761951 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836774111 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836802006 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836818933 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836839914 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836853027 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836880922 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836886883 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836920023 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836931944 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.836960077 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.836965084 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837002039 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837007999 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837039948 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837058067 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837080002 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837093115 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837121010 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837158918 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837172031 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837198973 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837204933 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837238073 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837244987 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837279081 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837284088 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837321997 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837337971 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837361097 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837392092 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837402105 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837414026 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837440968 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837475061 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837479115 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837491035 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837518930 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837555885 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837558031 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837593079 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837599039 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837611914 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837640047 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837645054 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837677002 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837682962 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837716103 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837723970 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837754965 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.837758064 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.837798119 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.864870071 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.864912033 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.864952087 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.864990950 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865004063 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865031004 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865071058 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865078926 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865109921 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865144014 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865148067 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865186930 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865226030 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865226984 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865267038 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865309954 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865345955 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865346909 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865385056 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865423918 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865428925 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865459919 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865478992 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865502119 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865540981 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865557909 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865581036 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865622044 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865636110 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865658998 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865694046 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865699053 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865739107 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865776062 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865801096 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865813971 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865880966 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865889072 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.865921974 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865962029 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.865962982 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866003990 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866041899 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866046906 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866080999 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866121054 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866132021 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866158009 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866180897 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866198063 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866238117 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866280079 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866305113 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866322994 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866359949 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866393089 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866400003 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866437912 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866446972 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866477966 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866518021 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866522074 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866556883 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866595984 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866604090 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866636038 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866657972 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866672993 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866713047 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866751909 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.866792917 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.866868019 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.893896103 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.893938065 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.893975019 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894016027 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894057035 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894083023 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894094944 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894123077 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894135952 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894175053 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894212961 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894233942 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894243956 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894254923 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894304037 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894342899 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894356966 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894381046 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894409895 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894418001 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894458055 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894486904 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894499063 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894536972 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894576073 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894594908 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894614935 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894653082 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894670963 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894692898 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894731045 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894747972 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894771099 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894812107 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894821882 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894850016 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894877911 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.894889116 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894927979 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894967079 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.894979954 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895005941 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895035028 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895045042 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895083904 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895123959 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895127058 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895160913 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895181894 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895200968 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895240068 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895277977 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895301104 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895318031 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895356894 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895359039 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895395994 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895437002 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895442009 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895473957 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895499945 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895514011 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895551920 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895590067 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895606041 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895629883 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895668030 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895672083 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895706892 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895746946 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.895755053 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.895833969 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.922756910 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.922813892 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.922852993 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.922893047 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.922933102 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.922962904 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.922974110 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923012972 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923015118 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923053026 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923094988 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923096895 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923132896 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923152924 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923172951 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923206091 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923212051 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923253059 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923294067 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923306942 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923335075 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923372984 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923383951 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923412085 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923438072 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923451900 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923490047 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923528910 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923544884 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923568010 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923607111 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923624039 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923648119 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923685074 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923707008 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923744917 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923784971 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923785925 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923824072 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923863888 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923896074 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923903942 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923942089 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.923974037 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.923980951 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924020052 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924027920 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924060106 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924101114 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924105883 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924139023 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924177885 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924190044 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924216986 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924236059 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924253941 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924304008 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924343109 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924355030 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924381018 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924418926 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924427032 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924457073 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924495935 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924508095 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924536943 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924560070 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924576044 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924614906 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924654961 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.924663067 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.924714088 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.951919079 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.951962948 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952002048 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952047110 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952085972 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952105999 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952125072 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952164888 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952174902 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952203989 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952224016 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952245951 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952286005 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952315092 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952326059 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952364922 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952378035 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952404022 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952444077 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952485085 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952486038 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952524900 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952564001 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952567101 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952604055 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952620983 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952644110 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952682972 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952696085 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952719927 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952759981 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952774048 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952799082 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952837944 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952841997 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952878952 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952919006 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952954054 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.952956915 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.952996969 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953033924 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953036070 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953074932 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953088045 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953114986 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953151941 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953165054 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953191042 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953231096 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953243971 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953268051 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953306913 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953322887 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953346968 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953372002 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953387022 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953428030 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953464985 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953480005 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953505039 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953532934 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953543901 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953583002 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953607082 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953623056 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953661919 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953701973 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953716993 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953742027 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953773022 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.953779936 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.953890085 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.967348099 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.980798006 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.980843067 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.980874062 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.980881929 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.980911970 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.980921984 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.980962038 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.980966091 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.980987072 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981003046 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981024027 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981044054 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981067896 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981084108 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981105089 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981122017 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981143951 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981162071 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981182098 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981200933 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981228113 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981241941 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981266022 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981292963 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981307983 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981332064 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981347084 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981372118 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981384039 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981411934 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:29.981426001 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:29.981473923 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.050879002 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.057991028 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.144469976 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.271039009 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.363136053 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.363244057 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.441307068 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.468461037 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.550693035 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.575704098 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.659996033 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.691910982 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.769403934 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.885507107 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:30.972569942 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:30.996370077 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:31.081948042 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:31.082082033 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:31.160057068 CET205049776212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:31.162969112 CET497762050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.246128082 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.273329020 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.274272919 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.275137901 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.319078922 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.323641062 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.351156950 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.351247072 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.441483974 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.468112946 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.566536903 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.566617012 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.660192966 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.663079977 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.754080057 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.754899979 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.832093954 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.834197998 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.834296942 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.862150908 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.905018091 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.915340900 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:35.988828897 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.042392015 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.129019022 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.133117914 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.222975969 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.226856947 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.300834894 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.373126030 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.457129955 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.459074974 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.487071991 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.487160921 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.515223980 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.561367035 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.797913074 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:36.879057884 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:36.932990074 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:37.022660971 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:37.236885071 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:37.316407919 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:37.460263968 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:37.535657883 CET205049777212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:37.935662985 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:37.935853004 CET497772050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.039359093 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.066781998 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.066912889 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.067521095 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.121295929 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.128346920 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.160798073 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.188381910 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.269831896 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.312016010 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.391964912 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.392029047 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.476702929 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.476828098 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.568263054 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.568478107 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.583048105 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.596014023 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.596096992 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.615689993 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.707734108 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.707828045 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.737585068 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.759834051 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.789151907 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.789269924 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.865567923 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.877027988 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:42.957532883 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:42.959724903 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.037321091 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.062139034 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.144653082 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.222898960 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.301575899 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.301691055 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.379578114 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.421583891 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.505429029 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.507185936 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.582127094 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.593576908 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.675939083 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.718581915 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.806961060 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.812474012 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:43.894779921 CET205049780212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:43.968638897 CET497802050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.068139076 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.095685959 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.095833063 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.104109049 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.147728920 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.159594059 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.187587976 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.208132982 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.285986900 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.286106110 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.363318920 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.385014057 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.472822905 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.472907066 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.550823927 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.550883055 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.568449020 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.577914953 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.577977896 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.596921921 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.676374912 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.676522017 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.706702948 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.719310999 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.746768951 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.796711922 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.813421965 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:48.894529104 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.984136105 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.066572905 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.126794100 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.207252026 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.265975952 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.347752094 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.424751043 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.503964901 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.504194975 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.597762108 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.597877026 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.675796032 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.719218969 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.801079035 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.813030958 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:49.894622087 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:49.969396114 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:50.043284893 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:50.050858974 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:50.050955057 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:50.052934885 CET205049781212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:50.053000927 CET497812050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.267564058 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.299516916 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.299609900 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.300277948 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.342749119 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.343137026 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.370764017 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.375960112 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.457308054 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.457406044 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.535372972 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.563971043 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.644778013 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.683186054 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.769645929 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.814775944 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:54.894648075 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.985342026 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.066647053 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.066735029 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.144705057 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.199026108 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.256614923 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.256715059 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.283951044 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.284034014 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.363493919 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.363584042 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.392489910 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.398267984 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.426004887 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.464436054 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.550904036 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.550993919 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.628982067 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.672977924 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.754048109 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.754132032 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.847767115 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.854496956 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:55.941751957 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:55.969702959 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:56.050829887 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:56.126321077 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:56.188442945 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:04:56.207195997 CET205049783212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:04:56.208484888 CET497832050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.519716024 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.547188997 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:00.547334909 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.555664062 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.611901045 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:00.617094040 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.645231962 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:00.688177109 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.770050049 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:00.814054012 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.897981882 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:00.898093939 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:00.983494043 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.053720951 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.129375935 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.129489899 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.207168102 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.209255934 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.285841942 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.313848972 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.322834015 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.341521978 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.341620922 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.383316040 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.473201036 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.473287106 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.501007080 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.540816069 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.569145918 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.704072952 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.808265924 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.879044056 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.879178047 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:01.957140923 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:01.972161055 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:02.050971031 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:02.133369923 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:02.223454952 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:02.228475094 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:02.316555023 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:02.316673040 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:02.394618034 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:02.423593044 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:02.503890991 CET205049784212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:02.572738886 CET497842050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:06.980706930 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.007808924 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.008275986 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.103318930 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.150070906 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.150248051 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.222759008 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.227507114 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.255527973 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.261914015 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.347574949 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.393600941 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.472616911 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.545789003 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.628931046 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.629106998 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.707402945 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.707659960 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.785200119 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.785393000 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.825901031 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.906753063 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:07.937004089 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:07.969963074 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.051867962 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.052067995 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.080065012 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.157814026 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.185719013 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.203870058 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.285327911 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.285418987 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.363384008 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.393764973 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.473088980 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.619153976 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.691389084 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.691529989 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.785195112 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.785954952 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.863207102 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.899631977 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:08.972778082 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:08.991172075 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:09.082143068 CET205049785212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:09.160104036 CET497852050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.356175900 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.383308887 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.383498907 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.384289980 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.426229000 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.426340103 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.503865957 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.504105091 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.533042908 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.533179998 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.613240004 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.615036011 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.707032919 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.805073023 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:13.878904104 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.939804077 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.019603014 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.086332083 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.175761938 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.175828934 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.254064083 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.271039009 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.271996021 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.298407078 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.298506975 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.380119085 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.380213022 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.407726049 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.455110073 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.482285976 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.486762047 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.566518068 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.612504005 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.691644907 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.728013992 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.816592932 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.816684008 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:14.894643068 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:14.956156969 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:15.035228014 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:15.035335064 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:15.128992081 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:15.190709114 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:15.255872011 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:15.294800043 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:15.379040003 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:15.563087940 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:15.647844076 CET205049810212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:15.823029995 CET498102050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.023405075 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.050740004 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.051503897 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.051948071 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.099505901 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.100644112 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.132366896 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.133070946 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.222798109 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.229551077 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.302943945 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.315454960 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.394393921 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.416682959 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.504179001 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.522993088 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.613807917 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.631201982 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.723406076 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.784235001 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.864819050 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:20.864948988 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:20.959554911 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.022353888 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.116772890 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.116874933 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.207271099 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.209023952 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.287772894 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.287869930 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.364154100 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.378112078 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.397828102 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.405566931 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.405637026 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.436738968 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.447824001 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.502576113 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.520190001 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.520303965 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.613362074 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.613653898 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.642008066 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.645785093 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.673782110 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.706212044 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.786541939 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.787044048 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.863157034 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.863250971 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:21.961709023 CET205049822212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:21.988410950 CET498222050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.060641050 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.087903023 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.092139959 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.092767954 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.136966944 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.137311935 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.165055990 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.177189112 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.253954887 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.316276073 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.394470930 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.409615040 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.488353968 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.534682035 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.613286018 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.663507938 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.757308960 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.759295940 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.837312937 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.837658882 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.925836086 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.926986933 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.944330931 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.954905987 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.955238104 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:26.997039080 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.082031965 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.082145929 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.113306046 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.113395929 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.143192053 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.190562963 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.281862020 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.364738941 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.412950039 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.508243084 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.508347988 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.582649946 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.598330021 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.676033020 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.722513914 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.817491055 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.817624092 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:27.895653963 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:27.941082954 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:28.024996042 CET205049826212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:28.068655968 CET498262050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.164443970 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.194988966 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.195128918 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.196197033 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.243557930 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.266530037 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.296077967 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.296199083 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.379151106 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.379344940 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.457272053 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.472908020 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.551016092 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.551125050 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.644639015 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.644790888 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.738529921 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.738735914 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.740928888 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.767008066 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.767098904 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.847672939 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.847762108 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.875603914 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.894620895 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:32.923906088 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.972282887 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.019565105 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.097759008 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:33.144589901 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.238476038 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:33.238549948 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.316534996 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:33.316663980 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.394612074 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:33.473155022 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.550864935 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:33.550940990 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.644665003 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:33.644728899 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:33.722922087 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:33.924588919 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:34.004050016 CET205049829212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:34.066744089 CET498292050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.142679930 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.169816971 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.169929981 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.184772968 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.227471113 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.229161024 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.257045031 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.257137060 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.347672939 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.347750902 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.430145979 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.441736937 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.535826921 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.535916090 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.614341974 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.641381979 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.728018045 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.728887081 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.757113934 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.758114100 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.788408041 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.788499117 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.822525978 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.822630882 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:38.912606001 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.912708998 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.004278898 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.020267963 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.097767115 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.146784067 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.234527111 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.254514933 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.331912994 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.394928932 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.472539902 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.472589016 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.566771984 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.567018032 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.616446018 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.723510027 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.816431046 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.816505909 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:39.894378901 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:39.926572084 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:40.003809929 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:40.004549980 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:40.082051992 CET205049831212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:40.129951000 CET498312050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.193367958 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.220789909 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.221682072 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.228887081 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.271836996 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.272017956 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.363204002 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.363307953 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.393944979 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.442003965 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.489538908 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.566411972 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.566512108 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.645987034 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.646068096 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.738327026 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.738420963 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.816414118 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.817956924 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.834763050 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.844974041 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.845077038 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.925482035 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.926193953 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:44.954194069 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.004542112 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.031675100 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.036173105 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.113266945 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.115956068 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.206935883 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.228003979 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.520234108 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.598033905 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.598126888 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.675950050 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.692616940 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.769946098 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.770055056 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.863676071 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:45.880084038 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:45.958035946 CET205049850212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:46.020649910 CET498502050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.088469028 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.116096973 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.116233110 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.117012024 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.162008047 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.162131071 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.253930092 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.254009008 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.281800032 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.286760092 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.363346100 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.411506891 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.504364967 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.504462004 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.582099915 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.596066952 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.675870895 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.675942898 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.754358053 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.754448891 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.804188013 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.805308104 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.832503080 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.832691908 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.910470963 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.910614014 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:50.938424110 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.974231005 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.001838923 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.036789894 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.113359928 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.177531958 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.254054070 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.254323006 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.332251072 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.349693060 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.426019907 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.474598885 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.568214893 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.568320036 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.644633055 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.724473953 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.800904989 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.801033020 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:51.879031897 CET205049855212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:51.943454027 CET498552050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.006634951 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.033791065 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.033973932 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.040369034 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.084171057 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.084312916 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.160111904 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.160305977 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.187983990 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.239950895 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.287904978 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.363217115 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.363301992 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.459203005 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.459311962 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.535119057 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.535346031 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.613269091 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.613465071 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.647038937 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.649013042 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.699507952 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.701256037 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.728878021 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.729162931 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.756822109 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.757266998 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.847665071 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.847839117 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:56.925792933 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:56.928169012 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.003818989 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.006501913 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.081950903 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.131254911 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.222702980 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.271872997 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.363349915 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.363533020 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.441453934 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.490401030 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.591187954 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.591295004 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.675720930 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.677886963 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.769349098 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.818500996 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.881593943 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:05:57.894551039 CET205049856212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:05:57.894702911 CET498562050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:01.950367928 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:01.977747917 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:01.977933884 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:01.978363991 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.028400898 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.028594971 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.113579035 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.113761902 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.141715050 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.183285952 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.269809961 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.319067955 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.394676924 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.394856930 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.490528107 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.538036108 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.613984108 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.614115000 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.707289934 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.707415104 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.800789118 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.800900936 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.879060984 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.881656885 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.921920061 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.922777891 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:02.954962015 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:02.955049992 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.050867081 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.050975084 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.105406046 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.105513096 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.132750034 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.147170067 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.223032951 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.272195101 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.363416910 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.397550106 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.476413965 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.522594929 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.613439083 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.647041082 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.738502026 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.738712072 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:03.816787958 CET205049858212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:03.817030907 CET498582050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:07.900265932 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:07.927881002 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:07.927982092 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:07.928723097 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:07.973210096 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:07.973659992 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.001292944 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.022865057 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.113646030 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.147540092 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.222796917 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.223051071 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.301609039 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.303811073 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.380913019 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.391390085 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.472917080 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.473119974 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.560929060 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.569725037 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.588927031 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.600917101 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.601011038 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.692934990 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.693053961 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.720525026 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.772170067 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.789216995 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.799271107 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.850294113 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.878725052 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.878838062 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:08.956958055 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:08.975940943 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:09.055778980 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:09.069916964 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:09.145528078 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:09.225770950 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:09.300640106 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:09.300760984 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:09.378809929 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:09.444780111 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:09.519418955 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:09.519963980 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:09.597632885 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:09.632412910 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:09.723946095 CET205049862212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:09.772983074 CET498622050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:13.810782909 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:13.838083029 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:13.838202000 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:13.838715076 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:13.882244110 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:13.883383036 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:13.911133051 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:13.912904024 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:13.989212990 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:14.084503889 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:14.084857941 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:14.112061977 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:14.113284111 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:14.141443968 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:14.141593933 CET498632050192.168.2.4212.193.30.28
                                                                                        Jan 14, 2022 17:06:14.169958115 CET205049863212.193.30.28192.168.2.4
                                                                                        Jan 14, 2022 17:06:14.225728035 CET498632050192.168.2.4212.193.30.28

                                                                                        UDP Packets

                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jan 14, 2022 17:04:29.006839037 CET5453153192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:04:29.027611971 CET53545318.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:04:35.225557089 CET4971453192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:04:35.244611025 CET53497148.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:04:41.995484114 CET5309753192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:04:42.016659021 CET53530978.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:04:48.019675016 CET4925753192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:04:48.039402962 CET53492578.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:04:54.246776104 CET4991053192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:04:54.266310930 CET53499108.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:00.495065928 CET5585453192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:00.517355919 CET53558548.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:06.960705042 CET6454953192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:06.978233099 CET53645498.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:13.337006092 CET5662153192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:13.354682922 CET53566218.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:19.897420883 CET6480153192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:19.916755915 CET53648018.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:26.029577971 CET6172153192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:26.047805071 CET53617218.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:32.140371084 CET5125553192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:32.163170099 CET53512558.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:38.122148991 CET6152253192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:38.141475916 CET53615228.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:44.172910929 CET5233753192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:44.192060947 CET53523378.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:50.064846992 CET5504653192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:50.086097956 CET53550468.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:05:55.985610962 CET4961253192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:05:56.004957914 CET53496128.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:06:01.927673101 CET5060153192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:06:01.948966980 CET53506018.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:06:07.878652096 CET5644853192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:06:07.898730040 CET53564488.8.8.8192.168.2.4
                                                                                        Jan 14, 2022 17:06:13.789107084 CET5917253192.168.2.48.8.8.8
                                                                                        Jan 14, 2022 17:06:13.810038090 CET53591728.8.8.8192.168.2.4

                                                                                        DNS Queries

                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                        Jan 14, 2022 17:04:29.006839037 CET192.168.2.48.8.8.80xecf1Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:35.225557089 CET192.168.2.48.8.8.80x605fStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:41.995484114 CET192.168.2.48.8.8.80x7dfeStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:48.019675016 CET192.168.2.48.8.8.80xd8ebStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:54.246776104 CET192.168.2.48.8.8.80xc8cbStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:00.495065928 CET192.168.2.48.8.8.80x4aaeStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:06.960705042 CET192.168.2.48.8.8.80x4cb6Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:13.337006092 CET192.168.2.48.8.8.80x3c2bStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:19.897420883 CET192.168.2.48.8.8.80x4ecdStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:26.029577971 CET192.168.2.48.8.8.80xd629Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:32.140371084 CET192.168.2.48.8.8.80xb5c3Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:38.122148991 CET192.168.2.48.8.8.80x6debStandard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:44.172910929 CET192.168.2.48.8.8.80x1f32Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:50.064846992 CET192.168.2.48.8.8.80x65a5Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:55.985610962 CET192.168.2.48.8.8.80x53f6Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:06:01.927673101 CET192.168.2.48.8.8.80x798Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:06:07.878652096 CET192.168.2.48.8.8.80xbfb7Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:06:13.789107084 CET192.168.2.48.8.8.80x611Standard query (0)nsayers4rm382.bounceme.netA (IP address)IN (0x0001)

                                                                                        DNS Answers

                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                        Jan 14, 2022 17:04:29.027611971 CET8.8.8.8192.168.2.40xecf1No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:35.244611025 CET8.8.8.8192.168.2.40x605fNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:42.016659021 CET8.8.8.8192.168.2.40x7dfeNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:48.039402962 CET8.8.8.8192.168.2.40xd8ebNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:04:54.266310930 CET8.8.8.8192.168.2.40xc8cbNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:00.517355919 CET8.8.8.8192.168.2.40x4aaeNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:06.978233099 CET8.8.8.8192.168.2.40x4cb6No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:13.354682922 CET8.8.8.8192.168.2.40x3c2bNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:19.916755915 CET8.8.8.8192.168.2.40x4ecdNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:26.047805071 CET8.8.8.8192.168.2.40xd629No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:32.163170099 CET8.8.8.8192.168.2.40xb5c3No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:38.141475916 CET8.8.8.8192.168.2.40x6debNo error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:44.192060947 CET8.8.8.8192.168.2.40x1f32No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:50.086097956 CET8.8.8.8192.168.2.40x65a5No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:05:56.004957914 CET8.8.8.8192.168.2.40x53f6No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:06:01.948966980 CET8.8.8.8192.168.2.40x798No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:06:07.898730040 CET8.8.8.8192.168.2.40xbfb7No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)
                                                                                        Jan 14, 2022 17:06:13.810038090 CET8.8.8.8192.168.2.40x611No error (0)nsayers4rm382.bounceme.net212.193.30.28A (IP address)IN (0x0001)

                                                                                        Code Manipulations

                                                                                        Statistics

                                                                                        CPU Usage

                                                                                        Click to jump to process

                                                                                        Memory Usage

                                                                                        Click to jump to process

                                                                                        High Level Behavior Distribution

                                                                                        Click to dive into process behavior distribution

                                                                                        Behavior

                                                                                        Click to jump to process

                                                                                        System Behavior

                                                                                        General

                                                                                        Start time:17:04:05
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Users\user\Desktop\4jE4gfofqX.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\4jE4gfofqX.exe"
                                                                                        Imagebase:0x950000
                                                                                        File size:445952 bytes
                                                                                        MD5 hash:39924FD67AD38B45A9F0871798074EC4
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.688995010.00000000030B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.689772422.0000000004194000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.689265362.0000000003206000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:17:04:15
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CGsmBdIfAIk.exe
                                                                                        Imagebase:0x120000
                                                                                        File size:430592 bytes
                                                                                        MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:16
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff724c50000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:16
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGsmBdIfAIk" /XML "C:\Users\user\AppData\Local\Temp\tmpC7DE.tmp
                                                                                        Imagebase:0x12e0000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:17
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff724c50000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:18
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        Imagebase:0xd90000
                                                                                        File size:32768 bytes
                                                                                        MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000007.00000003.701710687.0000000004865000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.679409854.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.681763573.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.679721715.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.681331500.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:17:04:24
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp20C3.tmp
                                                                                        Imagebase:0x12e0000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:25
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff724c50000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:26
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp298E.tmp
                                                                                        Imagebase:0x12e0000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:27
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
                                                                                        Imagebase:0x5c0000
                                                                                        File size:32768 bytes
                                                                                        MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:17:04:27
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6eb840000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:27
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff724c50000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:17:04:29
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                                                                        Imagebase:0xe90000
                                                                                        File size:32768 bytes
                                                                                        MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Antivirus matches:
                                                                                        • Detection: 0%, Metadefender, Browse
                                                                                        • Detection: 0%, ReversingLabs

                                                                                        General

                                                                                        Start time:17:04:29
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff724c50000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:17:04:33
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                                                                        Imagebase:0x7ff732050000
                                                                                        File size:32768 bytes
                                                                                        MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET

                                                                                        General

                                                                                        Start time:17:04:34
                                                                                        Start date:14/01/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff724c50000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        Disassembly

                                                                                        Code Analysis

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:21.8%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:17.1%
                                                                                          Total number of Nodes:76
                                                                                          Total number of Limit Nodes:2

                                                                                          Graph

                                                                                          execution_graph 5275 7080b8a 5276 7080bea 5275->5276 5277 7080bbf NtQuerySystemInformation 5275->5277 5276->5277 5278 7080bd4 5277->5278 5279 7080a0e 5281 7080a3d AdjustTokenPrivileges 5279->5281 5282 7080a5f 5281->5282 5287 7081d4e 5288 7081dae 5287->5288 5289 7081d83 PostMessageW 5287->5289 5288->5289 5290 7081d98 5289->5290 5370 2c10007 5371 2c10026 WinHelpW 5370->5371 5373 2c1009b 5371->5373 5354 7081782 5355 708179b CreateFileW 5354->5355 5357 7081899 5355->5357 5378 7080c04 5379 7080c32 CopyFileW 5378->5379 5381 7080c82 5379->5381 5350 7080b59 5351 7080b8a NtQuerySystemInformation 5350->5351 5353 7080bd4 5351->5353 5291 7080d1a 5293 7080d43 SetFileAttributesW 5291->5293 5294 7080d5f 5293->5294 5299 7081812 5301 708184a CreateFileW 5299->5301 5302 7081899 5301->5302 5382 7081a93 5384 7081ace DuplicateHandle 5382->5384 5385 7081b53 5384->5385 5342 7081d15 5343 7081d4e PostMessageW 5342->5343 5345 7081d98 5343->5345 5374 70809d7 5376 70809e1 AdjustTokenPrivileges 5374->5376 5377 7080a5f 5376->5377 5394 70818e8 5395 708192a GetFileType 5394->5395 5397 708198c 5395->5397 5358 7081ba9 5360 7081bf6 DeleteFileW 5358->5360 5361 7081c38 5360->5361 5311 70805ea 5314 7080613 LookupPrivilegeValueW 5311->5314 5313 708063a 5314->5313 5315 70819ea 5317 7081a1f WriteFile 5315->5317 5318 7081a51 5317->5318 5319 70805ac 5320 70805b8 LookupPrivilegeValueW 5319->5320 5321 7080543 CreateMutexW 5319->5321 5325 708063a 5320->5325 5323 708055d 5321->5323 5346 708112e 5348 708114e GetTokenInformation 5346->5348 5349 70811e0 5348->5349 5386 70804ae 5387 70804e2 CreateMutexW 5386->5387 5389 708055d 5387->5389 5362 7080da6 5364 7080dd2 LsaOpenPolicy 5362->5364 5365 7080e4b 5364->5365 5366 70819b8 5367 70819ea WriteFile 5366->5367 5369 7081a51 5367->5369 5334 7080c32 5336 7080c5b CopyFileW 5334->5336 5337 7080c82 5336->5337 5402 7080cf5 5404 7080d1a SetFileAttributesW 5402->5404 5405 7080d5f 5404->5405 5338 7081bf6 5340 7081c1c DeleteFileW 5338->5340 5341 7081c38 5340->5341

                                                                                          Executed Functions

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 2c10168-2c10190 1 2c10192 0->1 2 2c10197-2c10835 0->2 1->2 129 2c1083b call 2c10d41 2->129 130 2c1083b call 2c10d50 2->130 74 2c10841-2c10859 75 2c108db-2c108ef 74->75 76 2c108f5-2c10920 75->76 77 2c1085e-2c10865 75->77 131 2c10926 call 2c10e89 76->131 132 2c10926 call 2c10e98 76->132 78 2c108c1-2c108d2 77->78 80 2c108d4-2c108d8 78->80 81 2c10867-2c108b5 78->81 80->75 86 2c108bc-2c108be 81->86 85 2c1092c-2c10d33 86->78 129->74 130->74 131->85 132->85
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2S/p$:@fq$`-Qp
                                                                                          • API String ID: 0-2344586998
                                                                                          • Opcode ID: c62ae7657c9ceca0de9cd6f42fe9b60f7dc90dbf96e3d25359400558d86d89b1
                                                                                          • Instruction ID: 5f57c3c3fa15d737d340767654d41d692589859e06d657d2cc253232d08772a5
                                                                                          • Opcode Fuzzy Hash: c62ae7657c9ceca0de9cd6f42fe9b60f7dc90dbf96e3d25359400558d86d89b1
                                                                                          • Instruction Fuzzy Hash: F662A234A01218CFDB64DB64C894FD9B7B2BF89305F5181E9E809AB365CB35AE85CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 133 2c1015a-2c10190 134 2c10192 133->134 135 2c10197-2c10835 133->135 134->135 262 2c1083b call 2c10d41 135->262 263 2c1083b call 2c10d50 135->263 207 2c10841-2c10859 208 2c108db-2c108ef 207->208 209 2c108f5-2c10920 208->209 210 2c1085e-2c10865 208->210 264 2c10926 call 2c10e89 209->264 265 2c10926 call 2c10e98 209->265 211 2c108c1-2c108d2 210->211 213 2c108d4-2c108d8 211->213 214 2c10867-2c108b5 211->214 213->208 219 2c108bc-2c108be 214->219 218 2c1092c-2c10d33 219->211 262->207 263->207 264->218 265->218
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2S/p$:@fq$`-Qp
                                                                                          • API String ID: 0-2344586998
                                                                                          • Opcode ID: 0af8a0174f75c8ea06737109065f9cedfdfa2f25e818e8f3a289623effa00e34
                                                                                          • Instruction ID: 9c62d0cce68610d8cd9156a3cfaeef93ffdb459f19bdcdea2fabf611a3728ffe
                                                                                          • Opcode Fuzzy Hash: 0af8a0174f75c8ea06737109065f9cedfdfa2f25e818e8f3a289623effa00e34
                                                                                          • Instruction Fuzzy Hash: 1762A134A11218CFDB64DB64C894FD9B7B2BF89305F1181E9E809AB365CB35AE85CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 530 70809d7-7080a3b 534 7080a3d 530->534 535 7080a40-7080a4f 530->535 534->535 536 7080a51-7080a71 AdjustTokenPrivileges 535->536 537 7080a92-7080a97 535->537 540 7080a99-7080a9e 536->540 541 7080a73-7080a8f 536->541 537->536 540->541
                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 07080A57
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: 1f6444165efbb12fcd872744e1f74f6cbd4780a1204b974ec22523b149f3b3e7
                                                                                          • Instruction ID: 6afd89b41ccd185d32be7d3d606b1a60b1b900b093be990aaca5145d3c50426c
                                                                                          • Opcode Fuzzy Hash: 1f6444165efbb12fcd872744e1f74f6cbd4780a1204b974ec22523b149f3b3e7
                                                                                          • Instruction Fuzzy Hash: FB219FB55097849FEB628F25DC40B52BFF4EF06210F08859AE9858F163D270D908DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL(?,?,?,?), ref: 07080BC5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: d606191084cb8da11f1ec34e50f03ac2102e450d83953fc8c7c479e2dbfa5d5a
                                                                                          • Instruction ID: 4acb5a2adfe235cba2e83546823bc8d1da149a2e2b12aa2a1cf5c28e06fcc0a3
                                                                                          • Opcode Fuzzy Hash: d606191084cb8da11f1ec34e50f03ac2102e450d83953fc8c7c479e2dbfa5d5a
                                                                                          • Instruction Fuzzy Hash: A21190724097C09FDB628F15DC45A52FFB4EF06314F0984DAED848F263D275A908DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 07080A57
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: 800d4a7d284aeb6163e9042275e9adc0a809b42a7bef0308e008fb5ec68c4aa8
                                                                                          • Instruction ID: d66d77632345ec560c9e52253d1fdeb64207e71d484fe27c350e3290bd9b90fb
                                                                                          • Opcode Fuzzy Hash: 800d4a7d284aeb6163e9042275e9adc0a809b42a7bef0308e008fb5ec68c4aa8
                                                                                          • Instruction Fuzzy Hash: 5111A0B56007019FDB60DF55D884B66FBE4EF04220F08C56ADD898F612D375E418DB71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL(?,?,?,?), ref: 07080BC5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: 17c2cbe68f17af8a94d721ef70121fa310b7e44afce70922fa584abf794d1777
                                                                                          • Instruction ID: b143057fba5db7c85414ea730fb372fb66fd4ab4c12d88a4b4cd4a8ad31c80ae
                                                                                          • Opcode Fuzzy Hash: 17c2cbe68f17af8a94d721ef70121fa310b7e44afce70922fa584abf794d1777
                                                                                          • Instruction Fuzzy Hash: F5018B755007409FDBA09F46D884B65FBA0EF08324F08C59ADD890B716D375E418CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6a74d4fbfc955950d4fcbfa4ec0f95ff700163636f97988b7c0361c08c28a012
                                                                                          • Instruction ID: 25bfb31dd0ffb5d4496bc42830e51ffe894a66d93f8984cfa3b30e7f84024221
                                                                                          • Opcode Fuzzy Hash: 6a74d4fbfc955950d4fcbfa4ec0f95ff700163636f97988b7c0361c08c28a012
                                                                                          • Instruction Fuzzy Hash: 5D220379A04666CFD710CF69C8927BABBF1FF86300F04816AD856DB291D3349941EB83
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8d9e11a3ce0bdd23faf4373a100e4ec7fd4f78807a7317d42f4ad3ab75e8935f
                                                                                          • Instruction ID: 2a9e26d26d60e5841779908dda9cada95ce97f645be5a91a65bd3b492065d50c
                                                                                          • Opcode Fuzzy Hash: 8d9e11a3ce0bdd23faf4373a100e4ec7fd4f78807a7317d42f4ad3ab75e8935f
                                                                                          • Instruction Fuzzy Hash: 50F1D270A08285CFCB01CB69C8866AEFBF1BF87318F1485EAD056E7291D778D942DB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 266 70805ac-70805b6 267 70805b8 266->267 268 7080543-708054d 266->268 271 70805ba-70805d0 267->271 272 70805d2-7080611 267->272 269 708059e-70805a3 268->269 270 708054f-7080557 CreateMutexW 268->270 269->270 274 708055d-7080573 270->274 271->272 276 7080613 272->276 277 7080616-708061c 272->277 278 70805a5-70805aa 274->278 279 7080575-708059b 274->279 276->277 280 708061e 277->280 281 7080621-708062a 277->281 278->279 280->281 282 708062c-7080634 LookupPrivilegeValueW 281->282 283 708066d-7080672 281->283 286 708063a-708064c 282->286 283->282 288 708064e-708066a 286->288 289 7080674-7080679 286->289 289->288
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 07080555
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 07080632
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateLookupMutexPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 4106873102-0
                                                                                          • Opcode ID: a28452e2731e716fb08313da39e880441ed99874317137ebf2425be49e4cd861
                                                                                          • Instruction ID: 98a6ffc879b6e9bb074a4f0702147849eb5b393abcbfcd5895f260d1a8522239
                                                                                          • Opcode Fuzzy Hash: a28452e2731e716fb08313da39e880441ed99874317137ebf2425be49e4cd861
                                                                                          • Instruction Fuzzy Hash: 2241BFB25053819FE791CF65D885B92BFE4EF15320F0885AADC88CF252D375D908CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 291 7081782-7081799 292 708179b-708179f 291->292 293 70817a3-708186a 291->293 292->293 299 708186c 293->299 300 708186f-708187b 293->300 299->300 301 708187d 300->301 302 7081880-7081889 300->302 301->302 303 70818da-70818df 302->303 304 708188b-70818af CreateFileW 302->304 303->304 307 70818e1-70818e6 304->307 308 70818b1-70818d7 304->308 307->308
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 07081891
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: ae2bfe835dbf3750a9ff60973d340aa714562f80373c845fddaeedb2906d6ea4
                                                                                          • Instruction ID: 993984af957538b59fd0475d6479c664f92d153c7cd8d062f4c397053ed37602
                                                                                          • Opcode Fuzzy Hash: ae2bfe835dbf3750a9ff60973d340aa714562f80373c845fddaeedb2906d6ea4
                                                                                          • Instruction Fuzzy Hash: 5B515CB14093C09FE7538B658C54A52BFB4EF07314F0985DBE8C49F1A3D265A80AD772
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 421 7081a93-7081b43 426 7081b9b-7081ba0 421->426 427 7081b45-7081b4d DuplicateHandle 421->427 426->427 428 7081b53-7081b65 427->428 430 7081ba2-7081ba7 428->430 431 7081b67-7081b98 428->431 430->431
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,00000E2C), ref: 07081B4B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 889235cf887a5d7be577f33e743cdd28340a7d36e31a5cee24dd0a730a4a45a4
                                                                                          • Instruction ID: c6d4d98e2584bff7e2b6ca670b1339da1f1a7684682f957b24cab90869054dd5
                                                                                          • Opcode Fuzzy Hash: 889235cf887a5d7be577f33e743cdd28340a7d36e31a5cee24dd0a730a4a45a4
                                                                                          • Instruction Fuzzy Hash: 2731B6B14047856FEB22CF65DC84FA6BFE8EF05310F0885AAE9859B152D224E909CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 435 708112e-70811d0 441 708121d-7081222 435->441 442 70811d2-70811da GetTokenInformation 435->442 441->442 444 70811e0-70811f2 442->444 445 7081224-7081229 444->445 446 70811f4-708121a 444->446 445->446
                                                                                          APIs
                                                                                          • GetTokenInformation.KERNELBASE(?,00000E2C,584BC29E,00000000,00000000,00000000,00000000), ref: 070811D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationToken
                                                                                          • String ID:
                                                                                          • API String ID: 4114910276-0
                                                                                          • Opcode ID: 80cd7fa0dffbd7ae8fd16559e9cc41116bc0ea864be2d6c947bb8a3da0e66ff5
                                                                                          • Instruction ID: d63130c3586d59895f5e24ff2c7cee38033411b5575afc5070193ff0fe483eb8
                                                                                          • Opcode Fuzzy Hash: 80cd7fa0dffbd7ae8fd16559e9cc41116bc0ea864be2d6c947bb8a3da0e66ff5
                                                                                          • Instruction Fuzzy Hash: F73193B1509784AFEB628F65DC45FA6BFB8EF06310F08849BE9849B153D224E509CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 449 70804ae-7080531 453 7080533 449->453 454 7080536-708053f 449->454 453->454 455 7080541 454->455 456 7080544-708054d 454->456 455->456 457 708059e-70805a3 456->457 458 708054f-7080573 CreateMutexW 456->458 457->458 461 70805a5-70805aa 458->461 462 7080575-708059b 458->462 461->462
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 07080555
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: bc391c27cd87107d0b569df4a533cc4a785a6609c5b03aeb49a1a10439d54414
                                                                                          • Instruction ID: fdbc42ffb48b5776140e50ded2cc32877f13bfd426c71879e26e3d6a96611b2a
                                                                                          • Opcode Fuzzy Hash: bc391c27cd87107d0b569df4a533cc4a785a6609c5b03aeb49a1a10439d54414
                                                                                          • Instruction Fuzzy Hash: B33193B15097806FE762CB25DC84B56FFE8EF06310F08859AE984CB292D375E909CB71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 465 7080da6-7080e2d 469 7080e2f 465->469 470 7080e32-7080e3b 465->470 469->470 471 7080e8a-7080e8f 470->471 472 7080e3d-7080e45 LsaOpenPolicy 470->472 471->472 474 7080e4b-7080e5d 472->474 475 7080e5f-7080e87 474->475 476 7080e91-7080e96 474->476 476->475
                                                                                          APIs
                                                                                          • LsaOpenPolicy.ADVAPI32(?,00000E2C), ref: 07080E43
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: OpenPolicy
                                                                                          • String ID:
                                                                                          • API String ID: 2030686058-0
                                                                                          • Opcode ID: fdebd556c039930262c75f63cd29d8d79aea5f825554d5af7796a88f20c1f603
                                                                                          • Instruction ID: 621b77b1e0642168f9279a09475d17cffce9cda0354952b20de22452f4d31ef1
                                                                                          • Opcode Fuzzy Hash: fdebd556c039930262c75f63cd29d8d79aea5f825554d5af7796a88f20c1f603
                                                                                          • Instruction Fuzzy Hash: B0218FB2504344AFE761CF65DC85F6BBFE8EF05310F0884AAED849B152D264E509CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 480 7081ace-7081b43 484 7081b9b-7081ba0 480->484 485 7081b45-7081b4d DuplicateHandle 480->485 484->485 486 7081b53-7081b65 485->486 488 7081ba2-7081ba7 486->488 489 7081b67-7081b98 486->489 488->489
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,00000E2C), ref: 07081B4B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 0951a2d7ff735c4099431e337cd4493678a0a60336f79468b629adecfbadb54d
                                                                                          • Instruction ID: 406dba40fad0c2a3d8963ed70a67b8225d7e91e99837021038bb31ff03352c20
                                                                                          • Opcode Fuzzy Hash: 0951a2d7ff735c4099431e337cd4493678a0a60336f79468b629adecfbadb54d
                                                                                          • Instruction Fuzzy Hash: DD21B2B1500708AFEB219F65DC84F6AFBACEF04320F04896AED859A651E234E4058B71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 504 7081ba9-7081c1a 506 7081c1c 504->506 507 7081c1f-7081c28 504->507 506->507 508 7081c69-7081c6e 507->508 509 7081c2a-7081c4a DeleteFileW 507->509 508->509 512 7081c4c-7081c68 509->512 513 7081c70-7081c75 509->513 513->512
                                                                                          APIs
                                                                                          • DeleteFileW.KERNELBASE(?), ref: 07081C30
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteFile
                                                                                          • String ID:
                                                                                          • API String ID: 4033686569-0
                                                                                          • Opcode ID: e0f49ec9ead7f28d30764ce8423c6af298b0336262b911dd70d6ca4e8fd71338
                                                                                          • Instruction ID: 2f4cf8cc6815c215bf9de2c183638890f9a935bf88c8b8912c175d5103c048d4
                                                                                          • Opcode Fuzzy Hash: e0f49ec9ead7f28d30764ce8423c6af298b0336262b911dd70d6ca4e8fd71338
                                                                                          • Instruction Fuzzy Hash: BA219FB25093C09FDB52CB25DC94B52BFA4EF07610F0984DEDC848F263D225A808CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 493 70818e8-7081975 497 70819aa-70819af 493->497 498 7081977-708198a GetFileType 493->498 497->498 499 708198c-70819a9 498->499 500 70819b1-70819b6 498->500 500->499
                                                                                          APIs
                                                                                          • GetFileType.KERNELBASE(?,00000E2C,584BC29E,00000000,00000000,00000000,00000000), ref: 0708197D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileType
                                                                                          • String ID:
                                                                                          • API String ID: 3081899298-0
                                                                                          • Opcode ID: f28157f72cf5272fcdecac7ee580292ec07e2afaab35af7ba8b2022bd5e63bc8
                                                                                          • Instruction ID: cd4bf654d3563370936ab50353958398882b43372228a14af6254043971693d4
                                                                                          • Opcode Fuzzy Hash: f28157f72cf5272fcdecac7ee580292ec07e2afaab35af7ba8b2022bd5e63bc8
                                                                                          • Instruction Fuzzy Hash: 6721F5B64087846FE712CB25DC40BA2BFB8EF46720F1885DAED849B153D224E909C771
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 515 7081812-708186a 518 708186c 515->518 519 708186f-708187b 515->519 518->519 520 708187d 519->520 521 7081880-7081889 519->521 520->521 522 70818da-70818df 521->522 523 708188b-7081893 CreateFileW 521->523 522->523 525 7081899-70818af 523->525 526 70818e1-70818e6 525->526 527 70818b1-70818d7 525->527 526->527
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 07081891
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: f7824e9ea54c5719c1ddcb8a2488c5b3aa80a408d99c32c9b43521f3cc935444
                                                                                          • Instruction ID: 9bf77d92dfb06e3532967c4cf9ee05e19f20d9b0a19dfc0fd6d5e5cf87718b1d
                                                                                          • Opcode Fuzzy Hash: f7824e9ea54c5719c1ddcb8a2488c5b3aa80a408d99c32c9b43521f3cc935444
                                                                                          • Instruction Fuzzy Hash: 7E217CB1500704AFEB61DF66DC85B66FBE8EF08310F04856EE9858B651D375E405CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 543 70819b8-7081a41 547 7081a43-7081a63 WriteFile 543->547 548 7081a85-7081a8a 543->548 551 7081a8c-7081a91 547->551 552 7081a65-7081a82 547->552 548->547 551->552
                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,00000E2C,584BC29E,00000000,00000000,00000000,00000000), ref: 07081A49
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3934441357-0
                                                                                          • Opcode ID: 0e8cd16193f3644e02b906a8bd7b305cd7dfd2ddd4408ae23bbdea063a7352c8
                                                                                          • Instruction ID: 19c18498c7b36798055b7b46891d15d4153fd155eb6c3ed4eb4e052349f6c8c8
                                                                                          • Opcode Fuzzy Hash: 0e8cd16193f3644e02b906a8bd7b305cd7dfd2ddd4408ae23bbdea063a7352c8
                                                                                          • Instruction Fuzzy Hash: AC2190B1409384AFEB228F65DC44F56BFB8EF06314F0885ABE9849F153C265A409CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LsaOpenPolicy.ADVAPI32(?,00000E2C), ref: 07080E43
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: OpenPolicy
                                                                                          • String ID:
                                                                                          • API String ID: 2030686058-0
                                                                                          • Opcode ID: bb33184f723018dae79106be50d2266bb86547ccab66b7c69ca51fec2ba954ad
                                                                                          • Instruction ID: 9de176b864e3cd86b3c6404d5f9512d156e80409164d45ab3b43bb5a5a364080
                                                                                          • Opcode Fuzzy Hash: bb33184f723018dae79106be50d2266bb86547ccab66b7c69ca51fec2ba954ad
                                                                                          • Instruction Fuzzy Hash: 8021A1B1500304AFEB60DF69DC84F6BFBE8EF04710F04896AED849B241D274E4098B71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 07080555
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: 8f0e3f40138613b4f39449010623be9b8bc27ab91918794bcf5ee3df53f0fafe
                                                                                          • Instruction ID: 7aac45b4d7487e81e7cdaac5591061f1477f4c58f41a918214cc6536f7fc1565
                                                                                          • Opcode Fuzzy Hash: 8f0e3f40138613b4f39449010623be9b8bc27ab91918794bcf5ee3df53f0fafe
                                                                                          • Instruction Fuzzy Hash: 5D219FB1600740AFE760DF69DC85B66FBE8EF04310F04866AED898B241D775E508CB75
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: Help
                                                                                          • String ID:
                                                                                          • API String ID: 2830496658-0
                                                                                          • Opcode ID: 0d4a0703937899cb26edd156e141734b6f1ff77527bd9d9748efde8055434575
                                                                                          • Instruction ID: f8f2a2d5ddbf74b69c22e9511222b8e1d5889b64f8017c1e22e8382f9cede66e
                                                                                          • Opcode Fuzzy Hash: 0d4a0703937899cb26edd156e141734b6f1ff77527bd9d9748efde8055434575
                                                                                          • Instruction Fuzzy Hash: 7511026140F3C09FC7039B744C794AA7FB09E0725471A09EFC881DB1B3DA2D591AE766
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • CopyFileW.KERNELBASE(?,?,?), ref: 07080C7A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: CopyFile
                                                                                          • String ID:
                                                                                          • API String ID: 1304948518-0
                                                                                          • Opcode ID: 0b68d8bdc1e3872dd9bdc97dd067487f49bae1efbb340d415aa5e58ffc1e4ea5
                                                                                          • Instruction ID: bf7d6caf5d85238dea5f9b79ce09f67ce699f35ccc82fac9e4cfa7b8d563d1d3
                                                                                          • Opcode Fuzzy Hash: 0b68d8bdc1e3872dd9bdc97dd067487f49bae1efbb340d415aa5e58ffc1e4ea5
                                                                                          • Instruction Fuzzy Hash: 7921A4B15093819FD762CF65DC85B56FFE8EF06220F0984EAEC85CB252D274D848CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetTokenInformation.KERNELBASE(?,00000E2C,584BC29E,00000000,00000000,00000000,00000000), ref: 070811D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationToken
                                                                                          • String ID:
                                                                                          • API String ID: 4114910276-0
                                                                                          • Opcode ID: 430ed4c417b6cdb8e5345d227bd3330ed857aa2dee4814ede6d7fcea7e71fc6d
                                                                                          • Instruction ID: f7dce64bd8682b54576cdd9cc5bd4dec7b8ad719d4cac2c73827bdba0789ca6b
                                                                                          • Opcode Fuzzy Hash: 430ed4c417b6cdb8e5345d227bd3330ed857aa2dee4814ede6d7fcea7e71fc6d
                                                                                          • Instruction Fuzzy Hash: FA118CB1500308AFEB61DF65DC84BAABBACEF04320F04856AED45DB645D674E405CB71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 07081D89
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: ce264d765817e442de6fd1ce299dbe41e1b51b1b3e415e194fdf1c8be73d9646
                                                                                          • Instruction ID: f4ec109fda0f4fad3b5b0280252e89b37fe1f4ce4343cd2360b992482fb91b29
                                                                                          • Opcode Fuzzy Hash: ce264d765817e442de6fd1ce299dbe41e1b51b1b3e415e194fdf1c8be73d9646
                                                                                          • Instruction Fuzzy Hash: CD2189724093C49FDB638B25DC44A92BFB4EF17220F0985DAED858F163D265A818DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,00000E2C,584BC29E,00000000,00000000,00000000,00000000), ref: 07081A49
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3934441357-0
                                                                                          • Opcode ID: b0b69407e40505b177bc4bd5f3403a6f225f2807d822ca1c1426ea13bd62252b
                                                                                          • Instruction ID: 4c6323e3f27d3e552ed67e9dcdc28e12b1419d5c5695af2e2ada550b70e9392a
                                                                                          • Opcode Fuzzy Hash: b0b69407e40505b177bc4bd5f3403a6f225f2807d822ca1c1426ea13bd62252b
                                                                                          • Instruction Fuzzy Hash: 3011C1B1500304AFEB61DF55DC84FAAFBA8EF04320F04856AED859F246D275E405CBB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetFileAttributesW.KERNELBASE(?,?), ref: 07080D57
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile
                                                                                          • String ID:
                                                                                          • API String ID: 3188754299-0
                                                                                          • Opcode ID: d7982b03f6acb4b8a3a89d3acc920e9f1aa1837f476cbef38d4f25ca3240f83d
                                                                                          • Instruction ID: a0408585fbd973a4773567ca1482f62028f8667f706fb090ff24d9ef82c1e104
                                                                                          • Opcode Fuzzy Hash: d7982b03f6acb4b8a3a89d3acc920e9f1aa1837f476cbef38d4f25ca3240f83d
                                                                                          • Instruction Fuzzy Hash: DC11E6B15083809FDB51CF25DC85B56FFE8EF06210F0884AAEC85CF252D274E849CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 07082111
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: 023c8cdfd98daf074ca1de852c6df94382b538392c80b0997bf8424d3934caa8
                                                                                          • Instruction ID: 37e6e4c53edc02c30ccd2a3a55a84cf57abea27d07dfcde27b704c58638ff0bb
                                                                                          • Opcode Fuzzy Hash: 023c8cdfd98daf074ca1de852c6df94382b538392c80b0997bf8424d3934caa8
                                                                                          • Instruction Fuzzy Hash: A611E2714093809FDB228F15DC85B52FFB4EF06324F0884DEED858B263C275A418CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • CopyFileW.KERNELBASE(?,?,?), ref: 07080C7A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: CopyFile
                                                                                          • String ID:
                                                                                          • API String ID: 1304948518-0
                                                                                          • Opcode ID: 8706255c0981a9005f68b441a4abc7052c2acdba2b121c1655be8843a3c45066
                                                                                          • Instruction ID: 3f460a3aa3e8246694600d04756161a34ab306215c898dff6b64d2f85e2a3014
                                                                                          • Opcode Fuzzy Hash: 8706255c0981a9005f68b441a4abc7052c2acdba2b121c1655be8843a3c45066
                                                                                          • Instruction Fuzzy Hash: 951161B5A003018FDBA0DF6AD885756FBD8EF04220F08856ADD89CB745D775E408CA71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 07080632
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 8706255c0981a9005f68b441a4abc7052c2acdba2b121c1655be8843a3c45066
                                                                                          • Instruction ID: c384be4347c33a3446261cd7438ab7f13f2e10844e0f5254798d4c2020ed4c7c
                                                                                          • Opcode Fuzzy Hash: 8706255c0981a9005f68b441a4abc7052c2acdba2b121c1655be8843a3c45066
                                                                                          • Instruction Fuzzy Hash: DF11A5B1A003018FDBA0DF69DC84756FBD8EF54720F08856ADC49CB641D774D418CA71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetFileType.KERNELBASE(?,00000E2C,584BC29E,00000000,00000000,00000000,00000000), ref: 0708197D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileType
                                                                                          • String ID:
                                                                                          • API String ID: 3081899298-0
                                                                                          • Opcode ID: 311016df2e395b15452d69817fe1f21f6de9e97d7e264dcc15ebd2d931cfb0d0
                                                                                          • Instruction ID: f8fef91d56f8b76235e852694a6f53bf06db928d35dbd3f699a89c49364dad4d
                                                                                          • Opcode Fuzzy Hash: 311016df2e395b15452d69817fe1f21f6de9e97d7e264dcc15ebd2d931cfb0d0
                                                                                          • Instruction Fuzzy Hash: BE0149B1500304AFE760DF15DC84B6AFB98DF45320F04C06AED849B245D274E404CA72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetFileAttributesW.KERNELBASE(?,?), ref: 07080D57
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile
                                                                                          • String ID:
                                                                                          • API String ID: 3188754299-0
                                                                                          • Opcode ID: b5e8b57cbd98b30cb00cdc73e39a8cabf571c73813c82fa379156cb6a82c9032
                                                                                          • Instruction ID: fb29fa1fafce7ba6da67b45e5feb8f521743803caf30bd9438e9d5ae393d9b64
                                                                                          • Opcode Fuzzy Hash: b5e8b57cbd98b30cb00cdc73e39a8cabf571c73813c82fa379156cb6a82c9032
                                                                                          • Instruction Fuzzy Hash: 1A0192B16003419FDB90DF6AD885756FFD4EF04220F08C4AADC49CF656D274E408CA62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • DeleteFileW.KERNELBASE(?), ref: 07081C30
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteFile
                                                                                          • String ID:
                                                                                          • API String ID: 4033686569-0
                                                                                          • Opcode ID: 439bdf9a1073866446d482729c03a55e70a42a70fa6ba7003c13c6c50fce2504
                                                                                          • Instruction ID: 41ebd85def2500643cafda612ae53ea963e7921501725585c2ef568acac72ed3
                                                                                          • Opcode Fuzzy Hash: 439bdf9a1073866446d482729c03a55e70a42a70fa6ba7003c13c6c50fce2504
                                                                                          • Instruction Fuzzy Hash: F301B1B1A003058FDBA0DF6AD885766FBD8DF00620F08C4AEDD49CF646E674E404CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 07082111
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: a4e57c3f7a037105803baf84467791c9633f61d237c043a8cbd079cad9228fa5
                                                                                          • Instruction ID: 5dea68ab4715eb81f880e565ea2d7becc38da219b3835410decb6a6987bb6928
                                                                                          • Opcode Fuzzy Hash: a4e57c3f7a037105803baf84467791c9633f61d237c043a8cbd079cad9228fa5
                                                                                          • Instruction Fuzzy Hash: FE019E716007008FDB609F56DC84B66FBA0EF14320F1881AADE894A755D375E458CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 07081D89
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.692275381.0000000007080000.00000040.00000001.sdmp, Offset: 07080000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7080000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: ea71a1e552f1128ca393cf18f2c059f09ece5677b1c6981deb393e10a5ded426
                                                                                          • Instruction ID: d3d547b8539df9b6e53e51b6851e827a5b23be994595cf9d89809a842ebbd349
                                                                                          • Opcode Fuzzy Hash: ea71a1e552f1128ca393cf18f2c059f09ece5677b1c6981deb393e10a5ded426
                                                                                          • Instruction Fuzzy Hash: 54017C759007089FDBA09F46D884B65FBA0EF08320F08C59EDD890B616D375E459CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID: Help
                                                                                          • String ID:
                                                                                          • API String ID: 2830496658-0
                                                                                          • Opcode ID: 020a293fbb46dc306d9e6937276c7d94355b8dccb6d211a6b0850fdf7388edc3
                                                                                          • Instruction ID: 9b2186e1ac42b0d0009162b4466726157527006244b6eef8d491128e787be30c
                                                                                          • Opcode Fuzzy Hash: 020a293fbb46dc306d9e6937276c7d94355b8dccb6d211a6b0850fdf7388edc3
                                                                                          • Instruction Fuzzy Hash: FBE09A30563208ABCB08FBB4D95696E7B75EB42344F1008BD980123252CE39AE20EAD9
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688964269.0000000002C60000.00000040.00000040.sdmp, Offset: 02C60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c60000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4780563732d6d1726bab23812d252c9272495bac8536b7242b1608c31d2f9eb4
                                                                                          • Instruction ID: ac61f92439156080624a74b470285ed9ff06599e03501bca126413094dc49acb
                                                                                          • Opcode Fuzzy Hash: 4780563732d6d1726bab23812d252c9272495bac8536b7242b1608c31d2f9eb4
                                                                                          • Instruction Fuzzy Hash: 7811A234204244DFD315CB14C988B36BB95FB88708F24C9ACE9492B652C77BD803CE51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688964269.0000000002C60000.00000040.00000040.sdmp, Offset: 02C60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c60000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c4eeadbe277922c86f19be7a23dc964693bc6fba06b2967663e969aa0dea124a
                                                                                          • Instruction ID: 2dcc7ba4392b70a2b463ab974dccc177fd0ad902e62da931cbd58d3c1a141fc7
                                                                                          • Opcode Fuzzy Hash: c4eeadbe277922c86f19be7a23dc964693bc6fba06b2967663e969aa0dea124a
                                                                                          • Instruction Fuzzy Hash: 57115135149384DFC706CB10C594B25BBA1FB86714F28C6EED8491B652C3369917CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688964269.0000000002C60000.00000040.00000040.sdmp, Offset: 02C60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c60000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d0fb0fddc703b9c1c89a097caa081a245339e40d19178a5304bd783b12a35e61
                                                                                          • Instruction ID: 66e7a55412ff192cd758ec76253caebcb77933eda2cb2a4132b7fb485d483e70
                                                                                          • Opcode Fuzzy Hash: d0fb0fddc703b9c1c89a097caa081a245339e40d19178a5304bd783b12a35e61
                                                                                          • Instruction Fuzzy Hash: 5101D6755097806FD7118F06EC40897FFE8EF4623070981ABEC888B212C235B949CBB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688964269.0000000002C60000.00000040.00000040.sdmp, Offset: 02C60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c60000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8388fa57679453dc7b04d871bb3dcfd317d9f8cb342853e5fed44ee7779b5e3e
                                                                                          • Instruction ID: 51782004911d88340c29fffe6cd0a6671df6964b0f7ad5e6475cf31f9ec6d33a
                                                                                          • Opcode Fuzzy Hash: 8388fa57679453dc7b04d871bb3dcfd317d9f8cb342853e5fed44ee7779b5e3e
                                                                                          • Instruction Fuzzy Hash: F8F0FB35104644DFC206CB40D984B25FBA2FB89718F24C6A9E9491B752C337D913DA81
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688964269.0000000002C60000.00000040.00000040.sdmp, Offset: 02C60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c60000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1eba2a2e81725281a8d0a336e70accf399176c5ba00ae8738fd0b13ca2482243
                                                                                          • Instruction ID: 6f0ff62e3b8f70265efec6f3a118a91effa6ba65e8a27dc3b15f0a8e320b8f70
                                                                                          • Opcode Fuzzy Hash: 1eba2a2e81725281a8d0a336e70accf399176c5ba00ae8738fd0b13ca2482243
                                                                                          • Instruction Fuzzy Hash: D8E06D76A006045BD650CF0AEC81456FBD8EB84630718C07BDC0D8B700E675F5048EA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Non-executed Functions

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq$>_kq$f]kq
                                                                                          • API String ID: 0-1744552541
                                                                                          • Opcode ID: 2e15a98dea425dd6f2b09b4b5de260ceb4fcb3964d45958fad02c688a567b97a
                                                                                          • Instruction ID: 8af7c49ee2dec70b9f46377133064e33184703a995567df4c1808129721ace6a
                                                                                          • Opcode Fuzzy Hash: 2e15a98dea425dd6f2b09b4b5de260ceb4fcb3964d45958fad02c688a567b97a
                                                                                          • Instruction Fuzzy Hash: 4351EB70A046098BD744EFAEE8497CDBBF2FFC5304F15852AD104AB268DFB858059B95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.688860837.0000000002C10000.00000040.00000001.sdmp, Offset: 02C10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2c10000_4jE4gfofqX.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7cb1e080c60638f524127b24f50720b62f1868499c302cf636fe94f23ecc8aa3
                                                                                          • Instruction ID: 2190b2e7d81201aa362010f546d95c2e1506ac36150486dbd9417cca1098c273
                                                                                          • Opcode Fuzzy Hash: 7cb1e080c60638f524127b24f50720b62f1868499c302cf636fe94f23ecc8aa3
                                                                                          • Instruction Fuzzy Hash: 5E514C70E10268CFEBA4CFADC885B8DBBF1AF49304F5186A5D058EB205D7309A96CF55
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Executed Functions

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq
                                                                                          • API String ID: 0-3673016210
                                                                                          • Opcode ID: 0f1f09c5e0b4886a37b6902ac34ac52745ce1ce151d8cd4ca6dd505b52311b3f
                                                                                          • Instruction ID: 19d1b2dffecc9ef2c8c155f9b164c4b27b227ed26a88936ce016befe79a40c4f
                                                                                          • Opcode Fuzzy Hash: 0f1f09c5e0b4886a37b6902ac34ac52745ce1ce151d8cd4ca6dd505b52311b3f
                                                                                          • Instruction Fuzzy Hash: 31813C74B002018FCB14EBB9C454B6EB7E7AF85310F688469D80ADB7A9DA31DD41DB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq
                                                                                          • API String ID: 0-3673016210
                                                                                          • Opcode ID: 5bb80de3e91eb46c6ec9ce66a08892f693609e2c0fc9ecbb9ca9790239da7794
                                                                                          • Instruction ID: 56e18177332bd81530fda9e7a704a8db344ad81c1bf50c55b3a99f4c4351bcd1
                                                                                          • Opcode Fuzzy Hash: 5bb80de3e91eb46c6ec9ce66a08892f693609e2c0fc9ecbb9ca9790239da7794
                                                                                          • Instruction Fuzzy Hash: 6A714E34B002018FC719EB69D858B6D7BE3BB88741F588569E806DB3A9CFB1DD41DB84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq
                                                                                          • API String ID: 0-3673016210
                                                                                          • Opcode ID: 7499e6b4bab115244b6c2727c2b1fa9c4bf12aed3f58e04c5d04a11853f1f505
                                                                                          • Instruction ID: be2734d038844632184575b13e881950c94c6301bb2b7c9f035a47f62b9670e4
                                                                                          • Opcode Fuzzy Hash: 7499e6b4bab115244b6c2727c2b1fa9c4bf12aed3f58e04c5d04a11853f1f505
                                                                                          • Instruction Fuzzy Hash: ED614B34B002018FDB14EBA9C454B6EBBF7BF85310F29846AE806DB7A5DA31DD41DB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 65697c4cd92b501e4830b84e6320165711cd0b4c513fdf7285b4ff0c300f625e
                                                                                          • Instruction ID: 578dbe116710f0ad7b70f79b8b1161c15bca13b7da6e2104d8a5b61b6cd4f941
                                                                                          • Opcode Fuzzy Hash: 65697c4cd92b501e4830b84e6320165711cd0b4c513fdf7285b4ff0c300f625e
                                                                                          • Instruction Fuzzy Hash: FA416D31B00216CFDB24AF74D49876E7AB2AF84714F28406ED402AB391DFB5C885EF91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 660857dd79c9e58ef91bba7ffea414fa8f0655f62da97dfdc2bd86b5ccb00188
                                                                                          • Instruction ID: 10e0a190e15f1555d2e292372ea6ecae48150e1523728a5c2a0cee9367aa65a7
                                                                                          • Opcode Fuzzy Hash: 660857dd79c9e58ef91bba7ffea414fa8f0655f62da97dfdc2bd86b5ccb00188
                                                                                          • Instruction Fuzzy Hash: 65316D317052118FCB19AB3CC428B2D36E3AF86315B1944BDE006DF7A2EE39CC499795
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 82e62c2a0c22748bec5c4fdc32eb692f690376176dc4e52da339e24398e1c782
                                                                                          • Instruction ID: ef8eb21f42c8c4d3d0e5c71745cbf41d01b29b48dc5d5c440784e51145902f60
                                                                                          • Opcode Fuzzy Hash: 82e62c2a0c22748bec5c4fdc32eb692f690376176dc4e52da339e24398e1c782
                                                                                          • Instruction Fuzzy Hash: 3F2148317012128FCB58AB7CD018B2D36E3AF86315B2944BCE406DF7A1EE7ADC499795
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: bb9e404a96f22f9236c41a4d43521a30fd8414b7e1099b3e442f5e3a0f482a5e
                                                                                          • Instruction ID: e28e3ea6a0596e144ebe54f4bf4bb10df3ef82d221d6cc069e47fd7850d56156
                                                                                          • Opcode Fuzzy Hash: bb9e404a96f22f9236c41a4d43521a30fd8414b7e1099b3e442f5e3a0f482a5e
                                                                                          • Instruction Fuzzy Hash: F0F04F71D0A3859FCB42CF78DC655DA7FF4AE4A200B1640EBE584EB153E2340A07DB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699206919.0000000002910000.00000040.00000040.sdmp, Offset: 02910000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_2910000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5e910baa960992e8ba0b0038e2404d3b03eb0a11e2f1d2316ab2e65b5da4e0bc
                                                                                          • Instruction ID: bc67fec9e562503360d6e08dc686001c854aecb3a510fc26c271e86942f3d3ba
                                                                                          • Opcode Fuzzy Hash: 5e910baa960992e8ba0b0038e2404d3b03eb0a11e2f1d2316ab2e65b5da4e0bc
                                                                                          • Instruction Fuzzy Hash: 0801DB755497806FD7118B19EC41893BFE8DF4623070984AFEC49CB611D125B949CB71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0e6131d6fe0bed401250c6d93c0088bdf76f0d424a8aa260a20fc1c214e8af47
                                                                                          • Instruction ID: 9be0cabdadee43296ec56500e35c412a695d48f07634121743e503ec8e3cae43
                                                                                          • Opcode Fuzzy Hash: 0e6131d6fe0bed401250c6d93c0088bdf76f0d424a8aa260a20fc1c214e8af47
                                                                                          • Instruction Fuzzy Hash: 82012631D05249DBEB25DB38C86D7AEBFF2AB88700F08815BD401A7291CFB44E42DB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 27ae0f9cd37036a92290c56af5a04fbf687dc247233da67dbee3c8773fcb19bd
                                                                                          • Instruction ID: 73761996973ddcf8cfa9a2c5f19d3dd3abe6bb5a1ff8e0d0674613d49cbc6cc2
                                                                                          • Opcode Fuzzy Hash: 27ae0f9cd37036a92290c56af5a04fbf687dc247233da67dbee3c8773fcb19bd
                                                                                          • Instruction Fuzzy Hash: CCF0E232700250ABD714A6BA9C05FAB77DBEBC8770F18446AF709CB380DEA1DC409790
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 61cba9e315b90167c6a139e0ffe3480ae4ef2f9d64029682353cc8b9b9922b87
                                                                                          • Instruction ID: d0d93aaf1cb4b0cb5eaafe973098121b50a5b598bd124c016cadd847bb10831c
                                                                                          • Opcode Fuzzy Hash: 61cba9e315b90167c6a139e0ffe3480ae4ef2f9d64029682353cc8b9b9922b87
                                                                                          • Instruction Fuzzy Hash: 0CF0B4317192806BD72162355C15F672F976B86720F1D80ABF645CF282DE608C019761
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c54c38fe85ecf007d7b40863055750991f8f257cd08cd5473fc67f5d56944f37
                                                                                          • Instruction ID: ed5865fa19000cb4d9efc532d78a503570cbe57e13e0a14c31cab25ca841a062
                                                                                          • Opcode Fuzzy Hash: c54c38fe85ecf007d7b40863055750991f8f257cd08cd5473fc67f5d56944f37
                                                                                          • Instruction Fuzzy Hash: 62F0EC343151808FC305E778D464A453FE7DF4E20631980E7E449CB776CA319C06C752
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699206919.0000000002910000.00000040.00000040.sdmp, Offset: 02910000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_2910000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 328822c24ba2f0874efff5c310eca98e133a93ed31a0712db6c5e146a5a40b1d
                                                                                          • Instruction ID: 3f7c1358c2416f9942da26dc70e4b424116e8d2684682e32ca193939fec0f1ff
                                                                                          • Opcode Fuzzy Hash: 328822c24ba2f0874efff5c310eca98e133a93ed31a0712db6c5e146a5a40b1d
                                                                                          • Instruction Fuzzy Hash: 82E092B66006445BD650DF0AEC41456FBD8EB84630B18C47FDC0D8B701E535F504CEA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f6de005ec30cd0abb256a8d34ce8215c74f5733e8b3180f9bc56b7d70548de0a
                                                                                          • Instruction ID: 8ea7a83eb79307174a5374f4cd5c777f2d0c6afe6c9fef801472f07519325299
                                                                                          • Opcode Fuzzy Hash: f6de005ec30cd0abb256a8d34ce8215c74f5733e8b3180f9bc56b7d70548de0a
                                                                                          • Instruction Fuzzy Hash: 02E06DB1D0A2499ECF40DFBC9C5A2DFBFF5EB05220F0080BAD148E7102E6344102DB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4af921707d47a3bb25c0504fefaeb3f1037a2d4c1ed2547d951b988b1bafabc6
                                                                                          • Instruction ID: 25319ef1e4f8f74b2a815bc1cf7a164056c0497a3390651d9c7dc4fb02401c31
                                                                                          • Opcode Fuzzy Hash: 4af921707d47a3bb25c0504fefaeb3f1037a2d4c1ed2547d951b988b1bafabc6
                                                                                          • Instruction Fuzzy Hash: A3E092B1E0521E9F8F50EFB999456DEBFF8EB48250F20056AD608F3200E7315A118BE5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4b5e5f78131feb81503c66f73743d1847771432a8e62daa74a4a3be562863405
                                                                                          • Instruction ID: 26456e083b5edde6adf00eed5712236c9988f1a2898c2f599d940e20d0e8752d
                                                                                          • Opcode Fuzzy Hash: 4b5e5f78131feb81503c66f73743d1847771432a8e62daa74a4a3be562863405
                                                                                          • Instruction Fuzzy Hash: DEE09A343100108FC744EB6DE448A9A37EBEB8821231481B6E809C7328CE71AC00CB81
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000D.00000002.699111882.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_13_2_fd0000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a7af3315b791c5130a22297060d0adf289b85305d912ef141ecc7b6bb9334cf0
                                                                                          • Instruction ID: 6fbc6dd40f70257714ecb4ba59d2a6abbabd92a59fb86f6d318370db421993b0
                                                                                          • Opcode Fuzzy Hash: a7af3315b791c5130a22297060d0adf289b85305d912ef141ecc7b6bb9334cf0
                                                                                          • Instruction Fuzzy Hash: 45E0B6B1D00209AECB40EFBD98456EFBFF8EB48260F10403AD608E3200E23552158BE2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Non-executed Functions

                                                                                          Executed Functions

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq
                                                                                          • API String ID: 0-3673016210
                                                                                          • Opcode ID: c2dedbf6708dde0e7bb8a278e598b6a492e5498ae24ccca0dbcf2677ad13f2aa
                                                                                          • Instruction ID: 56066a56f2310197f4a34a1f655ee0bfe908579a29b05dcfdce67c63db41eddd
                                                                                          • Opcode Fuzzy Hash: c2dedbf6708dde0e7bb8a278e598b6a492e5498ae24ccca0dbcf2677ad13f2aa
                                                                                          • Instruction Fuzzy Hash: 84815D74B002068FCB14EBB9C454B6EB7E7EF89300F248469D80A9B7A4DB35DD45DBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq
                                                                                          • API String ID: 0-3673016210
                                                                                          • Opcode ID: 3c8e305db85e644893cfc0eaaf6713bcdfa7a17cc3a5ab2517ecd1eecde465bd
                                                                                          • Instruction ID: acf5ee4488beeb75449915a58e6771f10611def9652125367f4ce4b6347b7edd
                                                                                          • Opcode Fuzzy Hash: 3c8e305db85e644893cfc0eaaf6713bcdfa7a17cc3a5ab2517ecd1eecde465bd
                                                                                          • Instruction Fuzzy Hash: 9B712D746006018FDB68DB78D458B697BE7FB8D340F198168D8079B398CF769C45CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq
                                                                                          • API String ID: 0-3673016210
                                                                                          • Opcode ID: 42dafbb7ab65af6a423676f681bbbb851cf894183414e5b81a7a5258b5e30e00
                                                                                          • Instruction ID: cce06566f76cebd31b03c9f60cf35b5d46921d00fa5c85a3fb03ec5dfc45b7e7
                                                                                          • Opcode Fuzzy Hash: 42dafbb7ab65af6a423676f681bbbb851cf894183414e5b81a7a5258b5e30e00
                                                                                          • Instruction Fuzzy Hash: A9515A34B002069FCB14EBA9C454B6EBBF7EF89300F248069D80A9B7A4DB34DD45CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c5039624fadfcf9053139e54a7bfa320737db4c5e014fb8685cb2248feab7868
                                                                                          • Instruction ID: 744aba914d798f1ba0e91980bc6191319108bbcdf3c9283b3cbcb39d535d7a24
                                                                                          • Opcode Fuzzy Hash: c5039624fadfcf9053139e54a7bfa320737db4c5e014fb8685cb2248feab7868
                                                                                          • Instruction Fuzzy Hash: 92414BB0A40216CFDB28EF74C49876E7AF5AF8D714F144068D403AB395DB76C986CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e43668af59d0846c03275230f807315dc99c2c837f46afca859c647d05ea3e98
                                                                                          • Instruction ID: de9da862bfd04edeb8f6712da198aa84c773d419053d32a1ec1fd53ee4670cf8
                                                                                          • Opcode Fuzzy Hash: e43668af59d0846c03275230f807315dc99c2c837f46afca859c647d05ea3e98
                                                                                          • Instruction Fuzzy Hash: 183139317012128FCB59AB7CC028B2D36E7AF8A305B2944BCE406DF7A1EE76DC458791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 79e9c9975f9025f38d1d33cc2561272c5054fc39b5770f104f84d642b341783a
                                                                                          • Instruction ID: e5b4aba5696a28cc9198e5acd15de970d45cb44ede4f19d1ef6b2208a06e4930
                                                                                          • Opcode Fuzzy Hash: 79e9c9975f9025f38d1d33cc2561272c5054fc39b5770f104f84d642b341783a
                                                                                          • Instruction Fuzzy Hash: 0F2119317012128FCB59BB7CD028A2E36E7AF89315B1544BCE406DF7A1EE76DC498791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 759d3cbe978509d688a868c2da83f12d7b16f6768ac8bb032732406f9ee77930
                                                                                          • Instruction ID: 8390777b82a5a99a4494c0b37617d2d4edb25ab4445f49d64a6f96553f4a90d5
                                                                                          • Opcode Fuzzy Hash: 759d3cbe978509d688a868c2da83f12d7b16f6768ac8bb032732406f9ee77930
                                                                                          • Instruction Fuzzy Hash: C601A2F1D402089FDB28DB74C9187AEBEF5BB8E300F14442AC403A2298DBB54981CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704512781.0000000003160000.00000040.00000040.sdmp, Offset: 03160000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3160000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3a6f739bcf7f78690d4b4605a7dd5fd44f5c3ca752afb45b51a4d665bd26d3ba
                                                                                          • Instruction ID: 2a12b45b7825c36b44005b3fa9eaff375cff486b24ecf8a376cc50f69d482b95
                                                                                          • Opcode Fuzzy Hash: 3a6f739bcf7f78690d4b4605a7dd5fd44f5c3ca752afb45b51a4d665bd26d3ba
                                                                                          • Instruction Fuzzy Hash: AA0181B65497846FD711CF06EC41862FFE8EB86620709C09BEC498B651D275BA08CFB2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6a9f02e76a7c9f2d601390d9a365794df768a446c1a6f61d53d48bbdc23f6c5f
                                                                                          • Instruction ID: 06c8bebfbdb04ce5bd32cb2a657ac4f8fddd57f9e14041ce8388e0a96bf3b1dd
                                                                                          • Opcode Fuzzy Hash: 6a9f02e76a7c9f2d601390d9a365794df768a446c1a6f61d53d48bbdc23f6c5f
                                                                                          • Instruction Fuzzy Hash: 9EF090F1D102099FCB40DFB8A8406DEBFF8FB5A301F11046BD508E3212E23046128BA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b752008e2dc2633b9d3043f1b75ed129f62c738616fa2d1cff0ddc69326d9cac
                                                                                          • Instruction ID: ca0ceef3d5bc474f6749476504524c5ca1a0ead3298eb0ed6887ab871f786f51
                                                                                          • Opcode Fuzzy Hash: b752008e2dc2633b9d3043f1b75ed129f62c738616fa2d1cff0ddc69326d9cac
                                                                                          • Instruction Fuzzy Hash: 9EF0BE32300250ABDB14E6BAE810FAB77DBEBC9664F14447AE609CB290DE61DC008790
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e38237ddc1f7288ed35ccaede232c483141dd78c1aeff572ed5455d1178fba13
                                                                                          • Instruction ID: 80bc748da501b79017abb15fcfe0001019548037dbf5f0c7913861a06a0eeea0
                                                                                          • Opcode Fuzzy Hash: e38237ddc1f7288ed35ccaede232c483141dd78c1aeff572ed5455d1178fba13
                                                                                          • Instruction Fuzzy Hash: 19F027317103406FD724A67A5C10FBB3ADB9BCA750F15443AE605CB280EEB0C8028790
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6014b0d70fe6769e42d4112810a13107025bb725f805eef4872d6ef002d27072
                                                                                          • Instruction ID: 564e2e8cb6d7c983accec70590cde469877b67177af2667edfb2cad8d0729468
                                                                                          • Opcode Fuzzy Hash: 6014b0d70fe6769e42d4112810a13107025bb725f805eef4872d6ef002d27072
                                                                                          • Instruction Fuzzy Hash: 44F030396145148FC794DB78E4589AA37EAEB89311B1181A7E409C7370DA749C09CBD1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d2edeff8d3e3cbd7c535fe50aa4e4af7a0039c9daa49f5475212b2cecb1e8476
                                                                                          • Instruction ID: 5c81c8b9dc89c1939ee6a99de90d2c70c092852cd857d6d78c4f428f36cb8e1c
                                                                                          • Opcode Fuzzy Hash: d2edeff8d3e3cbd7c535fe50aa4e4af7a0039c9daa49f5475212b2cecb1e8476
                                                                                          • Instruction Fuzzy Hash: 7EF0C9B1D143099FCB90DFBC98456EEBFF4EB46355F11457AD509E2201E2354211CBE2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704512781.0000000003160000.00000040.00000040.sdmp, Offset: 03160000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3160000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: caa14a56c982a6feba4e43a40c7c0b1749588b70842dce0a97e53bc128df8fe6
                                                                                          • Instruction ID: 8a537a6a3447bc1a50adf6a5faf8f6f973d1e180d1d39b8d0e563852ab6c05f4
                                                                                          • Opcode Fuzzy Hash: caa14a56c982a6feba4e43a40c7c0b1749588b70842dce0a97e53bc128df8fe6
                                                                                          • Instruction Fuzzy Hash: C3E09276A446045BD650CF0AEC41452FBD8EB88630718C07FDC0D8B700E535F504CEA6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5a068d12d111335f70ce36109ce13949d87e58c5fccab867328a41e2ef98037b
                                                                                          • Instruction ID: 91725ae479069a821f50afa096ff314fcc8ec763a1ac0b553a1418cfc3b84e7d
                                                                                          • Opcode Fuzzy Hash: 5a068d12d111335f70ce36109ce13949d87e58c5fccab867328a41e2ef98037b
                                                                                          • Instruction Fuzzy Hash: 39E09A353100148FC394EB7CE45C99A37EBFB88310B1081A6E809C7320CE30AC08CBE1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 88a3214b02e94a59d57cba000445182f73e54daeee0e32b62ced2e5a4ddc2530
                                                                                          • Instruction ID: 053071da664df555934fe0f5afc8119e14cb4b5204270795ababc67178fe415e
                                                                                          • Opcode Fuzzy Hash: 88a3214b02e94a59d57cba000445182f73e54daeee0e32b62ced2e5a4ddc2530
                                                                                          • Instruction Fuzzy Hash: EEE092B1E0521E9F8F50EFBA99455DEBFF8FA4D250F20046AD609E3200E3315A118BE5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000010.00000002.704504459.0000000003130000.00000040.00000001.sdmp, Offset: 03130000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_16_2_3130000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 181fb2fdc65328f34c1e8c212e3cf983fc354dbf73e005249c00a681a994313e
                                                                                          • Instruction ID: be1fa7f87ae9ad368f33fd41152317db051b996d49aceeb2fefe4eb9b888f2b0
                                                                                          • Opcode Fuzzy Hash: 181fb2fdc65328f34c1e8c212e3cf983fc354dbf73e005249c00a681a994313e
                                                                                          • Instruction Fuzzy Hash: ABE0B6B1E00209AFCB40EFBD98456EFBFF8EB49260F10403AD508E3200E23552558BE2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Non-executed Functions

                                                                                          Executed Functions

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :@fq
                                                                                          • API String ID: 0-3673016210
                                                                                          • Opcode ID: 99f2c3b8d2cb079e644d19b0a3b6bbdb651508721bd14c97271f1f7d4f0691a8
                                                                                          • Instruction ID: dcca6b7dc02ce3a4100ec0adf5c576e4fa6fa53edc49096756ae2b6abbe78a70
                                                                                          • Opcode Fuzzy Hash: 99f2c3b8d2cb079e644d19b0a3b6bbdb651508721bd14c97271f1f7d4f0691a8
                                                                                          • Instruction Fuzzy Hash: DE711B34610202CFD769DB68D458B69BBE3FB88350F198568D806DB399CF75DC89DB80
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 16ab94922aeaacfa769985737da9eae9e9a5d9d65bc541354ccd67e8763a8599
                                                                                          • Instruction ID: 7d6700adad008005cce1b9db12380b9b36942b48e289e68bf169565e46d40e14
                                                                                          • Opcode Fuzzy Hash: 16ab94922aeaacfa769985737da9eae9e9a5d9d65bc541354ccd67e8763a8599
                                                                                          • Instruction Fuzzy Hash: 9DF18B30210602CFE729CF68D494B2A77B6FBC4324B25C55DD4568B38ADB70EC8ADB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a37ed15550b0238dfe4cf3c5c7d293af27bfabf5422e1a9ba5158b60dda1fc6d
                                                                                          • Instruction ID: 87937e69eab8c436500fa2d53578d27e833400f668750fd91ca286b6edd5858d
                                                                                          • Opcode Fuzzy Hash: a37ed15550b0238dfe4cf3c5c7d293af27bfabf5422e1a9ba5158b60dda1fc6d
                                                                                          • Instruction Fuzzy Hash: 4F3138317012128FCB59AB7CD418A6D37E3AF85315B1845BCD406DF7A1EE3ACC498791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a9a2a825bd8653ff40b177922d9c1e3ce876504c37f3ac5dd9089ef2104fc5b0
                                                                                          • Instruction ID: 316feea192a001e8d8d44e65ec180b9e16839e168868246ed337fe65f08408c9
                                                                                          • Opcode Fuzzy Hash: a9a2a825bd8653ff40b177922d9c1e3ce876504c37f3ac5dd9089ef2104fc5b0
                                                                                          • Instruction Fuzzy Hash: 0B2139317012128FCB59AB7CD018B2D36E3AF85315B1885BCE406DF7A1EE36DC498791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 81938eeb1719ea151fe09cd88a851454fa960e03407f6fea98d21c1cd924855e
                                                                                          • Instruction ID: aae0a0a4e62ec347551cd71be3f38199afa3d5af44c83b44e855369445488cf1
                                                                                          • Opcode Fuzzy Hash: 81938eeb1719ea151fe09cd88a851454fa960e03407f6fea98d21c1cd924855e
                                                                                          • Instruction Fuzzy Hash: B921C031B006059FC705EBACD8146AE7BA6BF85310B2484AAD5059F399CE34DD4A9BA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713038008.0000000003210000.00000040.00000040.sdmp, Offset: 03210000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3210000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e534ba8eecfd4e2de94f2151c3612e3e7a37959068727b0e2880d0fcf55383c6
                                                                                          • Instruction ID: 6b73d1c49e0b5994019f1fec680d8d6a9f583733968f4979e33d0ed289caccb0
                                                                                          • Opcode Fuzzy Hash: e534ba8eecfd4e2de94f2151c3612e3e7a37959068727b0e2880d0fcf55383c6
                                                                                          • Instruction Fuzzy Hash: 1A01FC765097809FC711CF15EC50856FFE8EB45720B18C8AFE849CB652E235F948CBA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ae6037ec5a3014e2daf73f52a52b01e492b745a22079242c97c1b40db956faae
                                                                                          • Instruction ID: d765ebda63bc51c69c56df4e73c1d01945398786d79a591c4912bf47484404a8
                                                                                          • Opcode Fuzzy Hash: ae6037ec5a3014e2daf73f52a52b01e492b745a22079242c97c1b40db956faae
                                                                                          • Instruction Fuzzy Hash: 4B014472D453499FCF01DFB9EC81ADEBFF4EA89220B5401AAD104E7212E3795715CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713038008.0000000003210000.00000040.00000040.sdmp, Offset: 03210000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3210000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a4d6d78284c53ae3a79893ca930342eb1c0b155981c7b3f73e81b344c9821eba
                                                                                          • Instruction ID: 797c35c40d0923399ae6f38185b07424da820ff3c61868256aad3a65cd7ef40d
                                                                                          • Opcode Fuzzy Hash: a4d6d78284c53ae3a79893ca930342eb1c0b155981c7b3f73e81b344c9821eba
                                                                                          • Instruction Fuzzy Hash: B501A7765497C06FD712CB16EC50853FFE8EB8662070884ABEC89CB612D125A909CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a3ac72bddd370e19f0ecae811f097743d1766b553ec4e9c8a487b919aefedff8
                                                                                          • Instruction ID: c9afa066c43c1d575824a24ebaffd7f413ef9d1373c6314df7262fa9ec07783d
                                                                                          • Opcode Fuzzy Hash: a3ac72bddd370e19f0ecae811f097743d1766b553ec4e9c8a487b919aefedff8
                                                                                          • Instruction Fuzzy Hash: C501FC319142499FEB25CF64C8587EEBFF2BB84310F058159C415A62C6CB751A8CCB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0e646bbcd079b1d629c9e24e0541d1c0a8039b9acd8dac095d8f909f98a8c3c0
                                                                                          • Instruction ID: 9ecc65beffb88f83b2d1e38d7040352c49bea8b6df0922da9573190a36cee8d1
                                                                                          • Opcode Fuzzy Hash: 0e646bbcd079b1d629c9e24e0541d1c0a8039b9acd8dac095d8f909f98a8c3c0
                                                                                          • Instruction Fuzzy Hash: 55F05434654340CFC344EB6CE894A693BE6EF89320B1445EBD405C7761CA799C09CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713038008.0000000003210000.00000040.00000040.sdmp, Offset: 03210000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3210000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2b9acfafb75318971d260bd1c0e8b94b983d9fa72cea94478cb05c9c100d8f2f
                                                                                          • Instruction ID: 8eda27b8ecf3d6470509d105ab62a3fef79d724823b74edc059f6afc24598580
                                                                                          • Opcode Fuzzy Hash: 2b9acfafb75318971d260bd1c0e8b94b983d9fa72cea94478cb05c9c100d8f2f
                                                                                          • Instruction Fuzzy Hash: 0DE06D766406005BD650CF0AEC41452FBD8EB84630718C46BDC0D8B704E535B508CEA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 61f99cca19971ea67b883fbff22d83876ece663e4845a006ca949289ea057739
                                                                                          • Instruction ID: 7e7740f9b2546635140be67f91f83554d50e9c21253bbf4a1a82438483b6749c
                                                                                          • Opcode Fuzzy Hash: 61f99cca19971ea67b883fbff22d83876ece663e4845a006ca949289ea057739
                                                                                          • Instruction Fuzzy Hash: 10E0DF326042008FC711DBA8EC09AD53BA0FF06220B0840D2D8408F2A2CB2ADE88DB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4d8e4d4c7126cfb703b8ca4ef97ff0ad45cee8f465936f4b77bb7262672bf014
                                                                                          • Instruction ID: f345fec909cb469afe8b7aaa08882eea6404665e03560a092225b883d0f8beec
                                                                                          • Opcode Fuzzy Hash: 4d8e4d4c7126cfb703b8ca4ef97ff0ad45cee8f465936f4b77bb7262672bf014
                                                                                          • Instruction Fuzzy Hash: 8BF01C30A502068FEB25DBA4C16C7ACBAF1AB89310F154459D412AA2A1DB784988DB55
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d4c575b36aa53b8ec5dc6f3c9f706f415ab360cff654b364fec22c7942509ddf
                                                                                          • Instruction ID: 24518798337b7fd08a25be1bb39ea21fe72b988b03ce9dec24c0e62fa9eee3f2
                                                                                          • Opcode Fuzzy Hash: d4c575b36aa53b8ec5dc6f3c9f706f415ab360cff654b364fec22c7942509ddf
                                                                                          • Instruction Fuzzy Hash: 25E01A34720110CFC344EB6CE444A5A37EBFB89361B1081A6E809D7361DE75AC48DBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000013.00000002.713026915.0000000003200000.00000040.00000001.sdmp, Offset: 03200000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_19_2_3200000_dhcpmon.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5d016a7d1ec82f959add9c5495389e6dd0c50316b501b174c15a1060a5f27263
                                                                                          • Instruction ID: b631aa511cd26cf8684ef4429cdbba232ffc96e96f5f6d5dc98e841e6486863b
                                                                                          • Opcode Fuzzy Hash: 5d016a7d1ec82f959add9c5495389e6dd0c50316b501b174c15a1060a5f27263
                                                                                          • Instruction Fuzzy Hash: 2FE0E571D102099F8F40DFB998455DEBFF8EA48250B100066D518E3200E23156048BE0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Non-executed Functions