Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HOANG HA TRADING - PRODUCTS LIST.exe

Overview

General Information

Sample Name:HOANG HA TRADING - PRODUCTS LIST.exe
Analysis ID:561384
MD5:3588f04ddba594909215ffa819d1a655
SHA1:1b350c789c3882acac391806dbc1ecb44632a297
SHA256:f35f5f2a4c1f89f26553ddb83c8df510a492873975224dee57e386b9fbc0795a
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Sigma detected: Powershell Defender Exclusion
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Creates processes with suspicious names
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • HOANG HA TRADING - PRODUCTS LIST.exe (PID: 3576 cmdline: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" MD5: 3588F04DDBA594909215FFA819D1A655)
    • powershell.exe (PID: 6284 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6300 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "2df65f40-d688-48d5-8802-f573ead9", "Group": "BILLION-1", "Domain1": "62.197.136.188", "Domain2": "127.0.0.1", "Port": 4052, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x2205:$x1: NanoCore.ClientPluginHost
  • 0x223e:$x2: IClientNetworkHost
0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2205:$x2: NanoCore.ClientPluginHost
  • 0x2320:$s4: PipeCreated
  • 0x221f:$s5: IClientLoggingHost
0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    Click to see the 57 entries
    SourceRuleDescriptionAuthorStrings
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1deb:$x1: NanoCore.ClientPluginHost
    • 0x1e24:$x2: IClientNetworkHost
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x1deb:$x2: NanoCore.ClientPluginHost
    • 0x1f36:$s4: PipeCreated
    • 0x1e05:$s5: IClientLoggingHost
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x3deb:$x1: NanoCore.ClientPluginHost
    • 0x3f48:$x2: IClientNetworkHost
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x3deb:$x2: NanoCore.ClientPluginHost
    • 0x4d41:$s3: PipeExists
    • 0x3fe1:$s4: PipeCreated
    • 0x3e05:$s5: IClientLoggingHost
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 144 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    System Summary

    barindex
    Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" , ParentImage: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ParentProcessId: 3576, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp, ProcessId: 6300
    Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" , ParentImage: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ParentProcessId: 3576, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, ProcessId: 6284
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe" , ParentImage: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ParentProcessId: 3576, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe, ProcessId: 6284
    Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132877898720977138.6284.DefaultAppDomain.powershell

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe, ProcessId: 6460, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2df65f40-d688-48d5-8802-f573ead9", "Group": "BILLION-1", "Domain1": "62.197.136.188", "Domain2": "127.0.0.1", "Port": 4052, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Source: HOANG HA TRADING - PRODUCTS LIST.exeVirustotal: Detection: 38%Perma Link
    Source: HOANG HA TRADING - PRODUCTS LIST.exeReversingLabs: Detection: 41%
    Source: 62.197.136.188Avira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Roaming\XWhIIIO.exeVirustotal: Detection: 38%Perma Link
    Source: C:\Users\user\AppData\Roaming\XWhIIIO.exeReversingLabs: Detection: 41%
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR
    Source: HOANG HA TRADING - PRODUCTS LIST.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\XWhIIIO.exeJoe Sandbox ML: detected
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpackAvira: Label: TR/NanoCore.fadte
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb8 source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]13_2_069220AE
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]13_2_06922037
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]13_2_06922048

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49691 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49692 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49694 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49695 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49696 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49697 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49698 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49699 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49700 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49701 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49702 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49703 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49704 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49705 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 62.197.136.188:4052
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49707 -> 62.197.136.188:4052
    Source: Malware configuration extractorURLs: 62.197.136.188
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: Joe Sandbox ViewASN Name: SPRINTLINKUS SPRINTLINKUS
    Source: global trafficTCP traffic: 192.168.2.3:49691 -> 62.197.136.188:4052
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: unknownTCP traffic detected without corresponding DNS query: 62.197.136.188
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR

    System Summary

    barindex
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39881d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6860000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.51b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.397e5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29c4e80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.66e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68ce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a14fdc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39881d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39881d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6860000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6860000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.51b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.51b0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.397e5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.397e5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6850000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5f50000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29c4e80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29c4e80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3979930.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6570000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.66e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.66e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68b0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cc42ee.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cbb4bf.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6880000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68ce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68ce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.68c4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6900000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6840000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3cd271e.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.6870000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a14fdc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.2a009a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.29f4758.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 0_2_012EC1D40_2_012EC1D4
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 0_2_012EE6080_2_012EE608
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 0_2_012EE6180_2_012EE618
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_05F502B013_2_05F502B0
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06923F9813_2_06923F98
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692029813_2_06920298
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692BBE813_2_0692BBE8
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692B31813_2_0692B318
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_069229A013_2_069229A0
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692F11A13_2_0692F11A
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692AFD013_2_0692AFD0
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692035613_2_06920356
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692405613_2_06924056
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_0692487813_2_06924878
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06FF15D813_2_06FF15D8
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilename vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345546984.0000000007540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilename vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilename vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000003.359166317.0000000000B9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552789505.0000000005E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeBinary or memory string: OriginalFilenameHashElementEnt.exe2 vs HOANG HA TRADING - PRODUCTS LIST.exe
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: XWhIIIO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: HOANG HA TRADING - PRODUCTS LIST.exeVirustotal: Detection: 38%
    Source: HOANG HA TRADING - PRODUCTS LIST.exeReversingLabs: Detection: 41%
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile read: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe:Zone.IdentifierJump to behavior
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe "C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe"
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmpJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: C:\Users\user\AppData\Roaming\XWhIIIO.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF354.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@11/12@0/1
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6292:120:WilError_01
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeMutant created: \Sessions\1\BaseNamedObjects\YzlPKyxwEbhsnjV
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2df65f40-d688-48d5-8802-f573ead9f587}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_01
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: HOANG HA TRADING - PRODUCTS LIST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb8 source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\CLwGpeArRS\src\obj\Debug\HashElementEnt.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, XWhIIIO.exe.0.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: XWhIIIO.exe.0.dr, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 0.0.HOANG HA TRADING - PRODUCTS LIST.exe.a60000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.a60000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 12.0.HOANG HA TRADING - PRODUCTS LIST.exe.350000.1.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 12.0.HOANG HA TRADING - PRODUCTS LIST.exe.350000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 12.2.HOANG HA TRADING - PRODUCTS LIST.exe.350000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.490000.1.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.490000.0.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.490000.11.unpack, Main.cs.Net Code: Major System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_069221D0 push es; ret 13_2_069221E0
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_069221F0 push es; ret 13_2_06922200
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06FF0698 push B406B6CFh; iretd 13_2_06FF06A1
    Source: initial sampleStatic PE information: section name: .text entropy: 7.84240410344
    Source: initial sampleStatic PE information: section name: .text entropy: 7.84240410344
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: \hoang ha trading - products list.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile created: C:\Users\user\AppData\Roaming\XWhIIIO.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeFile opened: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.2f5d430.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe TID: 3892Thread sleep time: -35577s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe TID: 3556Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6448Thread sleep time: -8301034833169293s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe TID: 6672Thread sleep time: -9223372036854770s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4404Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4293Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: threadDelayed 3184Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: threadDelayed 6034Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: foregroundWindowGot 566Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWindow / User API: foregroundWindowGot 706Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 35577Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548199204.0000000000B75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmpJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeProcess created: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeJump to behavior
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549490813.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.554011911.000000000713C000.00000004.00000010.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553409609.000000000682B000.00000004.00000010.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549448120.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550031915.0000000002F72000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549280989.0000000002DB9000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549311521.0000000002DBB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.549950081.0000000002F5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager.M
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553715802.0000000006A6C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552854454.0000000005F4C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Managerh
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553285438.00000000066DC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552580465.0000000005AAB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager 8
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeCode function: 13_2_06920E74 GetSystemTimes,13_2_06920E74
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exeString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000003.359166317.0000000000B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550216573.0000000003971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39dd051.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba4629.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.39d8a28.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.402ebb8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.HOANG HA TRADING - PRODUCTS LIST.exe.3ffc198.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b43835.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b51c67.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.HOANG HA TRADING - PRODUCTS LIST.exe.3b3aa04.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 3576, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: HOANG HA TRADING - PRODUCTS LIST.exe PID: 6460, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    Scheduled Task/Job
    12
    Process Injection
    1
    Masquerading
    11
    Input Capture
    1
    System Time Discovery
    Remote Services11
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Scheduled Task/Job
    Boot or Logon Initialization Scripts1
    Scheduled Task/Job
    11
    Disable or Modify Tools
    LSASS Memory211
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
    Process Injection
    NTDS21
    Virtualization/Sandbox Evasion
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
    Obfuscated Files or Information
    DCSync13
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    HOANG HA TRADING - PRODUCTS LIST.exe39%VirustotalBrowse
    HOANG HA TRADING - PRODUCTS LIST.exe42%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    HOANG HA TRADING - PRODUCTS LIST.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\XWhIIIO.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\XWhIIIO.exe39%VirustotalBrowse
    C:\Users\user\AppData\Roaming\XWhIIIO.exe42%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    SourceDetectionScannerLabelLinkDownload
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    13.2.HOANG HA TRADING - PRODUCTS LIST.exe.5ba0000.19.unpack100%AviraTR/NanoCore.fadteDownload File
    13.0.HOANG HA TRADING - PRODUCTS LIST.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    62.197.136.1880%VirustotalBrowse
    62.197.136.188100%Avira URL Cloudmalware
    127.0.0.10%VirustotalBrowse
    127.0.0.10%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    62.197.136.188true
    • 0%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    127.0.0.1true
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designersGHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designers/?HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers?HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.tiro.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.goodfont.co.krHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://google.comHOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.carterandcone.comlHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cTheHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-jones.htmlHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleaseHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers8HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, HOANG HA TRADING - PRODUCTS LIST.exe, 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sakkal.comHOANG HA TRADING - PRODUCTS LIST.exe, 00000000.00000002.345205902.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            62.197.136.188
                            unknownNetherlands
                            1239SPRINTLINKUStrue
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:561384
                            Start date:27.01.2022
                            Start time:12:43:18
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 36s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:HOANG HA TRADING - PRODUCTS LIST.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:18
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@11/12@0/1
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HDC Information:
                            • Successful, ratio: 0.7% (good quality ratio 0.2%)
                            • Quality average: 29.6%
                            • Quality standard deviation: 40.7%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 41
                            • Number of non-executed functions: 6
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Execution Graph export aborted for target HOANG HA TRADING - PRODUCTS LIST.exe, PID 6440 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            12:44:25API Interceptor771x Sleep call for process: HOANG HA TRADING - PRODUCTS LIST.exe modified
                            12:44:34API Interceptor43x Sleep call for process: powershell.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            62.197.136.188Thanh Phat International - Products list & specifications.exeGet hashmaliciousBrowse
                              Overdue Invoices for payment.pdf.exeGet hashmaliciousBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                SPRINTLINKUShGX7v1zhOeGet hashmaliciousBrowse
                                • 206.158.10.200
                                3Z6FoHYZcDGet hashmaliciousBrowse
                                • 208.23.93.147
                                loligang.x86Get hashmaliciousBrowse
                                • 204.106.193.38
                                QFC7hISXdaGet hashmaliciousBrowse
                                • 63.189.36.134
                                m5vMDP64fyGet hashmaliciousBrowse
                                • 63.173.88.90
                                armv5lGet hashmaliciousBrowse
                                • 62.197.136.231
                                armv7lGet hashmaliciousBrowse
                                • 62.197.136.231
                                mipsGet hashmaliciousBrowse
                                • 62.197.136.231
                                armv4lGet hashmaliciousBrowse
                                • 62.197.136.231
                                jpeEjRS2u3Get hashmaliciousBrowse
                                • 62.197.136.231
                                NtYg0fB1gEGet hashmaliciousBrowse
                                • 62.197.136.231
                                8ozWr2VJEfGet hashmaliciousBrowse
                                • 62.197.136.231
                                CfnXv62WAX.exeGet hashmaliciousBrowse
                                • 62.197.136.186
                                ft4et5G1aJGet hashmaliciousBrowse
                                • 206.159.84.145
                                vnU153XFcn.exeGet hashmaliciousBrowse
                                • 62.197.136.186
                                uVZuoZ6LRIGet hashmaliciousBrowse
                                • 65.163.214.115
                                dx86Get hashmaliciousBrowse
                                • 65.163.149.36
                                scan-payment-advice.xlsxGet hashmaliciousBrowse
                                • 62.197.136.186
                                New order..exeGet hashmaliciousBrowse
                                • 62.197.136.186
                                Scan docs.exeGet hashmaliciousBrowse
                                • 62.197.136.186
                                No context
                                No context
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):22392
                                Entropy (8bit):5.602882216687213
                                Encrypted:false
                                SSDEEP:384:vtCDTTuvS9LB/U3iUS0nwjultIq77Y9gxSJ3xuT1MavZlbAV7hG5ZBDI+Rzg:6L5VUTwCltlfxcECmfwwVU
                                MD5:9C89704256AD8C57C919C8F3A1917F1F
                                SHA1:C522CEAB4DF358A608BB2A76C22AFA9D27EEC6B2
                                SHA-256:6B121252553C385EF891E89523310000B4E1EBF87664C3A4FFFF640A59D9A23D
                                SHA-512:03A10C03655897BF0BC77F50400D2D378ED6D6CC4930F12102D07C8696889AD52C71F288BC464FE3054BDC77FCEE56CD195EB6EDF909EF30D8507D38763B782F
                                Malicious:false
                                Reputation:low
                                Preview:@...e...................h._...............H..........@..........H...............<@.^.L."My...:U..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:XML 1.0 document, ASCII text
                                Category:dropped
                                Size (bytes):1594
                                Entropy (8bit):5.147636160167977
                                Encrypted:false
                                SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtT5xvn:cge4MYrFdOFzOzN33ODOiDdKrsuTTvv
                                MD5:3467A7468FBE38A32CCD7F661AE64948
                                SHA1:3B5EC15B81BDD0B6C6F68263A4BD7B9C9630FFEA
                                SHA-256:195C8447F05F5552179030C801AC2C5FB6DFDC8850A721EF809A541B5E77BF06
                                SHA-512:FF61B32AFE5A40300CA709A603AF8397C31AF57DE832486C3AF20226CBB0827ACFC61DAF81BCF9772D91B53AF1FBBE374EC6CED2133EB116E2B0C63101A3F76D
                                Malicious:true
                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):232
                                Entropy (8bit):7.024371743172393
                                Encrypted:false
                                SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                MD5:32D0AAE13696FF7F8AF33B2D22451028
                                SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                Malicious:false
                                Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:ISO-8859 text, with CR line terminators
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:RVt:ft
                                MD5:BAE6600FA534ABB76FA969A360070C58
                                SHA1:3186B5081965D71EECFE535DD37309A2D031583E
                                SHA-256:5F2F02A0DE97B689C732B6B71CB72D7F66FA6CF63FC97BB80E9722D23CACCDE5
                                SHA-512:BED83063E01450FC57C3A4825AE872AA2EC3714DF66E0162806CF181B16314F580807EB482D236D3324E857EB4D6AD2019C923EF271D1D925E26305F0B52759D
                                Malicious:true
                                Preview:[......H
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):40
                                Entropy (8bit):5.153055907333276
                                Encrypted:false
                                SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                MD5:4E5E92E2369688041CC82EF9650EDED2
                                SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                Malicious:false
                                Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):327432
                                Entropy (8bit):7.99938831605763
                                Encrypted:true
                                SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                Malicious:false
                                Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):441856
                                Entropy (8bit):7.834985196744199
                                Encrypted:false
                                SSDEEP:6144:qpMFO+Q45IX8LhyTamQH7mDiZX0YIH9gCAMcKb/beI8mAWilDJC0qTs1EoHMHK/5:SXFH9gdMcMN8pJK3WMq/UOtL0eZ
                                MD5:3588F04DDBA594909215FFA819D1A655
                                SHA1:1B350C789C3882ACAC391806DBC1ECB44632A297
                                SHA-256:F35F5F2A4C1F89F26553DDB83C8DF510A492873975224DEE57E386B9FBC0795A
                                SHA-512:2AAE9F314D6A7ACD4C6607FEED54B0EA31331E5D7BD1D77C7B2F70B29646BF17CA0717C159E53548378F88289D5179188B7635C9B4E0504FD391B9206F56E45E
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Virustotal, Detection: 39%, Browse
                                • Antivirus: ReversingLabs, Detection: 42%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....".a..............0.............b.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...h.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................D.......H.......xD.. .......Z.......@.............................................(........}......{.....{....s....}.....(.....*..0............{.....+..*&...}....*...0.............+,...+...{....... (.......X...{........-....X...{........-..{.....{.....[.Y.{.....[.Y.X(.....{.....{.....[.Y.{.....[.O(.....{.....{.....[.{.....[.Y.O(.....{.....{.....[.{.....[.X(....*..0...........s....}.....(..........(.....{.....o.........(.....{.....o.........(.....{.....o.........(.....{.....o.........(
                                Process:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):5777
                                Entropy (8bit):5.4161494278237505
                                Encrypted:false
                                SSDEEP:96:BZ8hUNtqDo1ZvZHhUNtqDo1Z8F3tjZchUNtqDo1ZRQddSZF:/
                                MD5:7C45F52AC1D0360FD0C66DC7621109C6
                                SHA1:AC35EF33601A39DB921BBB1D3A9D3C6E3A7974BD
                                SHA-256:E4FC8EACB1E2AC6693B72B658CC0C5D59D8F2A2F5D6D64E8FB53769C84966D7F
                                SHA-512:89A16298E90A6C7C57756483735104BDD45FDC2708A00D35D9B04741DE88620DD310CEDA7EA846D36177FAE2BA46B1C9EDFF1805665182E305386E57A384F1BB
                                Malicious:false
                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220127124434..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\XWhIIIO.exe..Process ID: 6284..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220127124434..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\XWhIIIO.exe..**********************..Windows PowerShell transcript start..Start time: 20220127124837..Username: computer\user..RunAs User: computer\user..Con
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.834985196744199
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:HOANG HA TRADING - PRODUCTS LIST.exe
                                File size:441856
                                MD5:3588f04ddba594909215ffa819d1a655
                                SHA1:1b350c789c3882acac391806dbc1ecb44632a297
                                SHA256:f35f5f2a4c1f89f26553ddb83c8df510a492873975224dee57e386b9fbc0795a
                                SHA512:2aae9f314d6a7acd4c6607feed54b0ea31331e5d7bd1d77c7b2f70b29646bf17ca0717c159e53548378f88289d5179188b7635c9b4e0504fd391b9206f56e45e
                                SSDEEP:6144:qpMFO+Q45IX8LhyTamQH7mDiZX0YIH9gCAMcKb/beI8mAWilDJC0qTs1EoHMHK/5:SXFH9gdMcMN8pJK3WMq/UOtL0eZ
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....".a..............0.............b.... ........@.. ....................... ............@................................
                                Icon Hash:00828e8e8686b000
                                Entrypoint:0x46d362
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x61F2228A [Thu Jan 27 04:41:46 2022 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x6d3100x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x5f8.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x700000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6d1d80x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x6b3680x6b400False0.905489692599data7.84240410344IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0x6e0000x5f80x600False0.4296875data4.20859981737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x700000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_VERSION0x6e0900x366data
                                RT_MANIFEST0x6e4080x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                DLLImport
                                mscoree.dll_CorExeMain
                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightCopyright Overwolf 2021
                                Assembly Version11.0.0.0
                                InternalNameHashElementEnt.exe
                                FileVersion11.0.0.0
                                CompanyNameOverwolf LTD
                                LegalTrademarks
                                Comments
                                ProductNameOverwolf
                                ProductVersion11.0.0.0
                                FileDescriptionOverwolf
                                OriginalFilenameHashElementEnt.exe
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                01/27/22-12:44:46.390279TCP2025019ET TROJAN Possible NanoCore C2 60B496914052192.168.2.362.197.136.188
                                01/27/22-12:44:52.932033TCP2025019ET TROJAN Possible NanoCore C2 60B496924052192.168.2.362.197.136.188
                                01/27/22-12:44:59.456999TCP2025019ET TROJAN Possible NanoCore C2 60B496944052192.168.2.362.197.136.188
                                01/27/22-12:45:07.015474TCP2025019ET TROJAN Possible NanoCore C2 60B496954052192.168.2.362.197.136.188
                                01/27/22-12:45:13.058509TCP2025019ET TROJAN Possible NanoCore C2 60B496964052192.168.2.362.197.136.188
                                01/27/22-12:45:19.802384TCP2025019ET TROJAN Possible NanoCore C2 60B496974052192.168.2.362.197.136.188
                                01/27/22-12:45:25.746771TCP2025019ET TROJAN Possible NanoCore C2 60B496984052192.168.2.362.197.136.188
                                01/27/22-12:45:31.854870TCP2025019ET TROJAN Possible NanoCore C2 60B496994052192.168.2.362.197.136.188
                                01/27/22-12:45:37.809917TCP2025019ET TROJAN Possible NanoCore C2 60B497004052192.168.2.362.197.136.188
                                01/27/22-12:45:43.827723TCP2025019ET TROJAN Possible NanoCore C2 60B497014052192.168.2.362.197.136.188
                                01/27/22-12:45:48.874690TCP2025019ET TROJAN Possible NanoCore C2 60B497024052192.168.2.362.197.136.188
                                01/27/22-12:45:53.922190TCP2025019ET TROJAN Possible NanoCore C2 60B497034052192.168.2.362.197.136.188
                                01/27/22-12:45:59.081946TCP2025019ET TROJAN Possible NanoCore C2 60B497044052192.168.2.362.197.136.188
                                01/27/22-12:46:05.073938TCP2025019ET TROJAN Possible NanoCore C2 60B497054052192.168.2.362.197.136.188
                                01/27/22-12:46:11.147135TCP2025019ET TROJAN Possible NanoCore C2 60B497064052192.168.2.362.197.136.188
                                01/27/22-12:46:15.825425TCP2025019ET TROJAN Possible NanoCore C2 60B497074052192.168.2.362.197.136.188
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 27, 2022 12:44:46.214098930 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:46.241147995 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:46.241326094 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:46.390279055 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:46.431857109 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:46.480118036 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:46.514540911 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:46.655117989 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:46.677963018 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:46.730134964 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.019212008 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.156794071 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.156900883 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.176754951 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.176815033 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.176856995 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.176879883 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.176894903 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.176923990 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.176932096 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.176954031 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.204154968 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204216957 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204261065 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204301119 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204317093 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.204338074 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204377890 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204380989 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.204417944 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204451084 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.204458952 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.204524040 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.231389046 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231450081 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231487989 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231527090 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231535912 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.231565952 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231605053 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.231606007 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231647015 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231684923 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231689930 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.231724024 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231756926 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.231765032 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231803894 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231838942 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.231844902 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231884956 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231916904 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.231924057 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231965065 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.231990099 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.232003927 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.232069016 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259080887 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259139061 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259180069 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259234905 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259273052 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259311914 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259341955 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259356976 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259397984 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259402037 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259408951 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259438038 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259464025 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259475946 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259515047 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259532928 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259555101 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259593010 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259630919 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259633064 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259668112 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259704113 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259707928 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259751081 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259772062 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259788990 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259829044 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259851933 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259869099 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259907007 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259941101 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.259947062 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.259985924 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260009050 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.260025024 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260066032 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260087967 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.260102034 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260143042 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260164976 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.260180950 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260221004 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260251045 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.260261059 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260301113 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260334969 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.260340929 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.260409117 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.287689924 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.287748098 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.287789106 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.287822008 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.287827969 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.287869930 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.287884951 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.287916899 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.287955999 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.287977934 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.287995100 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288036108 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288054943 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288074017 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288114071 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288126945 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288152933 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288192034 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288209915 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288234949 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288273096 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288290977 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288311958 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288352013 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288367033 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288389921 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288429976 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288445950 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288469076 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288508892 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288522959 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288548946 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288588047 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288600922 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288628101 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288666964 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288680077 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288706064 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288744926 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288758039 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288784027 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288824081 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288837910 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288863897 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288902998 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288916111 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.288942099 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288981915 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.288995028 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289020061 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289058924 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289072990 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289098978 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289138079 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289151907 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289179087 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289216995 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289232016 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289258957 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289299965 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289314032 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289336920 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289376974 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289390087 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289414883 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289454937 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289469004 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289495945 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289532900 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289546967 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.289572001 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.289624929 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.316644907 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316700935 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316741943 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316782951 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316792965 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.316821098 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316853046 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.316862106 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316904068 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316943884 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.316946983 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.316986084 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317009926 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317024946 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317065954 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317085981 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317106962 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317145109 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317162991 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317183018 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317223072 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317241907 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317262888 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317303896 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317320108 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317342043 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317380905 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317420006 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317420006 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317456961 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317491055 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317496061 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317534924 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317574978 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317583084 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317615986 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317639112 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317653894 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317692995 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317711115 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317733049 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317770958 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317790031 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317810059 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317882061 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.317883968 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317928076 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.317969084 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318000078 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318007946 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318047047 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318068981 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318085909 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318125010 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318162918 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318177938 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318202972 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318239927 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318252087 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318293095 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318312883 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318332911 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318371058 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318402052 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318409920 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318449974 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318476915 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318487883 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318526983 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318550110 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.318567038 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.318634987 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347151995 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347208977 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347266912 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347290039 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347306013 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347347021 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347367048 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347388029 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347428083 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347449064 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347476959 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347533941 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347533941 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347582102 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347624063 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347636938 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347662926 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347702026 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347713947 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347740889 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347779989 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347793102 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347820044 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347860098 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347873926 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347898006 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347935915 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.347950935 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.347975016 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348012924 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348026037 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348052979 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348090887 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348104000 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348130941 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348170996 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348182917 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348208904 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348249912 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348299026 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348300934 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348336935 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348356009 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348376036 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348416090 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348438025 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348454952 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348495007 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348526955 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348531961 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348572016 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348588943 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348611116 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348648071 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348663092 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348686934 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348725080 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348745108 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348764896 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348804951 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348823071 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348853111 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348893881 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348907948 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.348933935 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348963022 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.348994017 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.349025011 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.349066019 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.349116087 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.349186897 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376147032 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376219034 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376260042 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376288891 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376300097 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376341105 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376360893 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376379967 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376420975 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376451969 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376482964 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376523972 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376563072 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376573086 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376605034 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376627922 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376643896 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376657963 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376682997 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376724005 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376744986 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376775026 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376816988 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376823902 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376857042 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376908064 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376913071 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.376955986 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.376996040 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377012014 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377036095 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377074003 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377094984 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377113104 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377154112 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377166033 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377193928 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377237082 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377250910 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377274036 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377314091 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377327919 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377353907 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377392054 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377412081 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377429962 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377469063 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377485037 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377509117 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377549887 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377571106 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377588987 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377629042 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377669096 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377674103 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377707958 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377747059 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377749920 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377785921 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377800941 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377825975 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377916098 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.377919912 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.377963066 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.378001928 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.378041983 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.378060102 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.378088951 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.378112078 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.378128052 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.378190994 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405038118 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405081987 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405121088 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405139923 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405160904 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405200005 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405214071 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405241966 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405282974 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405292988 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405320883 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405360937 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405370951 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405400991 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405441046 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405451059 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405482054 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405519962 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405535936 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405559063 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405597925 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405611992 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:47.405637026 CET40524969162.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:47.405690908 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:48.280319929 CET496914052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:52.903964996 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:52.931365013 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:52.931474924 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:52.932033062 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:53.066741943 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:53.160825014 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:53.161108017 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:53.189058065 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:53.230703115 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:53.279145956 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:53.381731987 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:53.400747061 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:53.585299969 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:53.587399006 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:53.637047052 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:53.664316893 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:53.715071917 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:53.980581999 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:54.079132080 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:54.079304934 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:54.108505964 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:54.152688026 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:54.179980040 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:54.230808020 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:54.244498968 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:54.485336065 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:54.770152092 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:54.985512018 CET40524969262.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:55.276139975 CET496924052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:59.421014071 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:59.448070049 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:59.448224068 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:59.456999063 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:59.512732983 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:59.513406992 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:59.574218988 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:59.575437069 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:59.782959938 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:44:59.783380985 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:44:59.985956907 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:00.021939039 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:00.037102938 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:00.063975096 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:00.121885061 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:00.266693115 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:00.309412956 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:00.336416006 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:00.403225899 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:00.534001112 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:00.561120987 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:00.561245918 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:00.588279963 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:00.599565983 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:00.784548044 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:01.938173056 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:02.109888077 CET40524969462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:02.950999022 CET496944052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:06.969791889 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:06.999178886 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:06.999290943 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.015474081 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.058700085 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:07.058830023 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.288780928 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:07.288911104 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.317699909 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:07.372471094 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.494184971 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.581134081 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:07.809966087 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:07.811130047 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.838063955 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:07.888153076 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:07.917067051 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:07.954545021 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:08.081093073 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:08.081199884 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:08.226416111 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:08.230772018 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:08.260998964 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:08.261092901 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:08.432070971 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:08.799449921 CET40524969562.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:08.841428041 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:09.017339945 CET496954052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:13.030549049 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:13.057657003 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:13.057811022 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:13.058509111 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:13.283937931 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:13.284024954 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:13.471524000 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.077420950 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.212239981 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.212718010 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.240190029 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.295005083 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.408334970 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.580960989 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.707134962 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.708174944 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.735178947 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.779356003 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.784121037 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.879491091 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.906768084 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:14.936774015 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:14.965543032 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:15.092647076 CET40524969662.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:15.113666058 CET496964052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:19.774585009 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:19.801662922 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:19.801786900 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:19.802383900 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:19.879684925 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:19.907233953 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:19.907542944 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:19.934777021 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:19.982930899 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:20.165688038 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:20.245069981 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:20.363811016 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:20.365391016 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:20.392179966 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:20.393166065 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:20.420600891 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:20.420711040 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:20.447777987 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:20.448009014 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:20.580945969 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:20.672991037 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:20.783896923 CET40524969762.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:21.672209978 CET496974052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:25.719121933 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:25.746033907 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:25.746176004 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:25.746771097 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:25.816241026 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:25.816567898 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:25.845153093 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:25.890002966 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.034081936 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.181484938 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:26.290745974 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:26.292490959 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.319603920 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:26.374028921 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.400732994 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:26.412620068 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.440061092 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:26.443703890 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.471095085 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:26.473642111 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.572645903 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:26.673316002 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:26.884130001 CET40524969862.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:27.672513008 CET496984052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:31.821110964 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:31.848409891 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:31.848551035 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:31.854870081 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:31.929968119 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:31.964818001 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:31.995060921 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:32.046426058 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:32.179188967 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:32.271442890 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:32.532521963 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:32.577827930 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:32.637840986 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:32.771503925 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:32.868644953 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:33.074510098 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:33.124706984 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:33.151830912 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:33.152432919 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:33.187172890 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:33.187360048 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:33.338234901 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:33.338387012 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:33.583955050 CET40524969962.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:33.769603014 CET496994052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:37.782490969 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:37.809204102 CET40524970062.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:37.809318066 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:37.809916973 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:37.934314966 CET40524970062.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:38.780329943 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:38.945740938 CET40524970062.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:38.952887058 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:38.985615969 CET40524970062.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:39.031414986 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:39.226691961 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:39.485224962 CET40524970062.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:39.785322905 CET497004052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:43.798916101 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:43.827033997 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:43.827174902 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:43.827723026 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:43.930207968 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:43.984893084 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.012155056 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.012434006 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.040081024 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.094410896 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.341166973 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.452128887 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.552340031 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.594324112 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.602256060 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.628276110 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.672517061 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.749371052 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.749641895 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.778578997 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.828847885 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.829978943 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:44.856173992 CET40524970162.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:44.856451035 CET497014052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:48.846375942 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:48.873601913 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:48.873740911 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:48.874690056 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:48.938844919 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:48.939459085 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:48.966845989 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.016546011 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.043526888 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.094692945 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.211319923 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.398971081 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.400006056 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.426922083 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.469810963 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.500241995 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.502192020 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.547698975 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.547806978 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.605194092 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.607867002 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:49.848618031 CET40524970262.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:49.876600981 CET497024052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:53.893384933 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:53.921159029 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:53.921277046 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:53.922189951 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:53.998339891 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:53.998450041 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.081803083 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:54.091084957 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.120419979 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:54.173259020 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.321872950 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.395198107 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:54.644995928 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:54.648247004 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.675228119 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:54.696827888 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.725824118 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:54.728486061 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.820394993 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:54.822496891 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:54.911109924 CET40524970362.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:55.017709970 CET497034052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.035021067 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.063229084 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.063486099 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.081945896 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.133492947 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.133994102 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.168800116 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.220592022 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.365411043 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.453768969 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.553390980 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.555690050 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.583035946 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.585388899 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.617463112 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.620560884 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.648379087 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:45:59.689407110 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.881216049 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:45:59.971474886 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:00.034017086 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:00.126585007 CET40524970462.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:01.019526958 CET497044052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.035265923 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.072602987 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.072778940 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.073937893 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.154406071 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.408273935 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.408679962 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.436125040 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.486754894 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.603061914 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.688158989 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.799045086 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.812889099 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.840307951 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.893095970 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.919997931 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.920372963 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.955961943 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.956120968 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:05.992139101 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:05.992341995 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:06.076605082 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:06.076750040 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:06.111629963 CET40524970562.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:06.158660889 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:07.110522032 CET497054052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.113553047 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.146531105 CET40524970662.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:11.146641016 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.147135019 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.178618908 CET40524970662.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:11.221541882 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.250355959 CET40524970662.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:11.250799894 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.368877888 CET40524970662.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:11.409096003 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.566576958 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:11.687165022 CET40524970662.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:11.758603096 CET497064052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:15.785495043 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:15.823719025 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:15.825186968 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:15.825424910 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:15.984060049 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.176623106 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.176892042 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:16.207412004 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.208885908 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:16.279328108 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.436738968 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.437144041 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:16.464046955 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.464528084 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:16.495985031 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.496085882 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:16.523577929 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:16.565726042 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:20.976341009 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:21.022259951 CET497074052192.168.2.362.197.136.188
                                Jan 27, 2022 12:46:22.314614058 CET40524970762.197.136.188192.168.2.3
                                Jan 27, 2022 12:46:22.364120960 CET497074052192.168.2.362.197.136.188

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:12:44:08
                                Start date:27/01/2022
                                Path:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe"
                                Imagebase:0xa60000
                                File size:441856 bytes
                                MD5 hash:3588F04DDBA594909215FFA819D1A655
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.343719392.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.341610591.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.341051623.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low

                                Target ID:8
                                Start time:12:44:32
                                Start date:27/01/2022
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XWhIIIO.exe
                                Imagebase:0xac0000
                                File size:430592 bytes
                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Reputation:high

                                Target ID:9
                                Start time:12:44:32
                                Start date:27/01/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7f20f0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:10
                                Start time:12:44:32
                                Start date:27/01/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XWhIIIO" /XML "C:\Users\user\AppData\Local\Temp\tmpF354.tmp
                                Imagebase:0x1020000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:11
                                Start time:12:44:33
                                Start date:27/01/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7f20f0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:12
                                Start time:12:44:34
                                Start date:27/01/2022
                                Path:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                Imagebase:0x350000
                                File size:441856 bytes
                                MD5 hash:3588F04DDBA594909215FFA819D1A655
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:13
                                Start time:12:44:35
                                Start date:27/01/2022
                                Path:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\HOANG HA TRADING - PRODUCTS LIST.exe
                                Imagebase:0x490000
                                File size:441856 bytes
                                MD5 hash:3588F04DDBA594909215FFA819D1A655
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553479253.0000000006850000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.338178828.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.548853139.0000000002971000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553495828.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.551380125.0000000003C5F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553508914.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553295380.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.338501190.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.552629896.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.550429661.00000000039D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553457385.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552454196.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553587766.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553547292.0000000006890000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553529227.0000000006880000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.337767531.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553655349.0000000006900000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.547124757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.338846811.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553237518.0000000006570000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.553603368.00000000068C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.548918331.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.550917756.0000000003B35000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:9.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:138
                                  Total number of Limit Nodes:10
                                  execution_graph 13417 12efd98 13418 12efe00 CreateWindowExW 13417->13418 13420 12efebc 13418->13420 13421 12eb958 DuplicateHandle 13422 12eb9ee 13421->13422 13423 12e9230 13427 12e9720 13423->13427 13435 12e9730 13423->13435 13424 12e923f 13428 12e9743 13427->13428 13429 12e975b 13428->13429 13443 12e99b8 13428->13443 13447 12e99a9 13428->13447 13429->13424 13430 12e9753 13430->13429 13431 12e9958 GetModuleHandleW 13430->13431 13432 12e9985 13431->13432 13432->13424 13436 12e9743 13435->13436 13438 12e975b 13436->13438 13441 12e99b8 LoadLibraryExW 13436->13441 13442 12e99a9 LoadLibraryExW 13436->13442 13437 12e9753 13437->13438 13439 12e9958 GetModuleHandleW 13437->13439 13438->13424 13440 12e9985 13439->13440 13440->13424 13441->13437 13442->13437 13444 12e99cc 13443->13444 13445 12e99f1 13444->13445 13451 12e9348 13444->13451 13445->13430 13448 12e99cc 13447->13448 13449 12e99f1 13448->13449 13450 12e9348 LoadLibraryExW 13448->13450 13449->13430 13450->13449 13452 12e9b98 LoadLibraryExW 13451->13452 13454 12e9c11 13452->13454 13454->13445 13455 12eb730 GetCurrentProcess 13456 12eb7aa GetCurrentThread 13455->13456 13457 12eb7a3 13455->13457 13458 12eb7e7 GetCurrentProcess 13456->13458 13459 12eb7e0 13456->13459 13457->13456 13462 12eb81d 13458->13462 13459->13458 13460 12eb845 GetCurrentThreadId 13461 12eb876 13460->13461 13462->13460 13463 12e40e0 13464 12e40f7 13463->13464 13465 12e4108 13464->13465 13469 12e4201 13464->13469 13474 12e387c 13465->13474 13467 12e4127 13470 12e4225 13469->13470 13478 12e4300 13470->13478 13482 12e42f0 13470->13482 13475 12e3887 13474->13475 13490 12e5814 13475->13490 13477 12e6a42 13477->13467 13480 12e4327 13478->13480 13479 12e4404 13479->13479 13480->13479 13486 12e38bc 13480->13486 13484 12e4327 13482->13484 13483 12e4404 13483->13483 13484->13483 13485 12e38bc CreateActCtxA 13484->13485 13485->13483 13487 12e5390 CreateActCtxA 13486->13487 13489 12e5453 13487->13489 13491 12e581f 13490->13491 13494 12e5834 13491->13494 13493 12e6b45 13493->13477 13495 12e583f 13494->13495 13498 12e5864 13495->13498 13497 12e6c22 13497->13493 13499 12e586f 13498->13499 13502 12e5894 13499->13502 13501 12e6d22 13501->13497 13503 12e589f 13502->13503 13507 12e71e9 13503->13507 13508 12e7488 13503->13508 13504 12e747c 13504->13501 13507->13504 13514 12eb363 13507->13514 13509 12e747a 13508->13509 13510 12e7472 13508->13510 13511 12e747c 13509->13511 13513 12eb363 2 API calls 13509->13513 13510->13511 13512 12eb363 2 API calls 13510->13512 13511->13507 13512->13511 13513->13511 13515 12eb381 13514->13515 13516 12eb3a5 13515->13516 13519 12eb608 13515->13519 13523 12eb618 13515->13523 13516->13504 13520 12eb625 13519->13520 13521 12eb65f 13520->13521 13527 12e9648 13520->13527 13521->13516 13524 12eb625 13523->13524 13525 12eb65f 13524->13525 13526 12e9648 2 API calls 13524->13526 13525->13516 13526->13525 13529 12e9653 13527->13529 13528 12ec358 13529->13528 13531 12ebf18 13529->13531 13532 12ebf23 13531->13532 13533 12e5894 2 API calls 13532->13533 13534 12ec3c7 13533->13534 13535 12ec3d5 13534->13535 13547 12ec430 13534->13547 13551 12ec440 13534->13551 13555 12ebf28 13535->13555 13537 12ec3ef 13560 12ebf38 13537->13560 13539 12ec3f6 13564 12ee138 13539->13564 13568 12ee150 13539->13568 13573 12edfb7 13539->13573 13580 12ec2d8 13539->13580 13540 12ec400 13540->13528 13548 12ec46e 13547->13548 13549 12ebf38 LoadLibraryExW GetModuleHandleW 13548->13549 13550 12ec4af 13548->13550 13549->13550 13552 12ec46e 13551->13552 13553 12ebf38 LoadLibraryExW GetModuleHandleW 13552->13553 13554 12ec4af 13552->13554 13553->13554 13558 12ebf33 13555->13558 13556 12ec1b4 LoadLibraryExW GetModuleHandleW 13557 12ed564 13556->13557 13557->13537 13558->13556 13559 12ed569 13558->13559 13559->13537 13561 12ebf43 13560->13561 13562 12ec2d8 LoadLibraryExW GetModuleHandleW 13561->13562 13563 12edb77 13561->13563 13562->13563 13563->13539 13566 12ee105 13564->13566 13565 12ee18d 13565->13540 13566->13564 13566->13565 13567 12ee5d0 LoadLibraryExW GetModuleHandleW 13566->13567 13567->13565 13570 12ee181 13568->13570 13571 12ee1cd 13568->13571 13569 12ee18d 13569->13540 13570->13569 13572 12ee5d0 LoadLibraryExW GetModuleHandleW 13570->13572 13571->13540 13572->13571 13576 12edfc2 13573->13576 13574 12ee128 13574->13540 13575 12ee0f1 13578 12ee18d 13575->13578 13579 12ee5d0 LoadLibraryExW GetModuleHandleW 13575->13579 13576->13574 13576->13575 13577 12ec2d8 LoadLibraryExW GetModuleHandleW 13576->13577 13577->13576 13578->13540 13579->13578 13582 12ec2e3 13580->13582 13581 12ee128 13581->13540 13582->13581 13583 12ee0f1 13582->13583 13584 12ec2d8 LoadLibraryExW GetModuleHandleW 13582->13584 13585 12ee18d 13583->13585 13586 12ee5d0 LoadLibraryExW GetModuleHandleW 13583->13586 13584->13582 13585->13540 13586->13585

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 012EB790
                                  • GetCurrentThread.KERNEL32 ref: 012EB7CD
                                  • GetCurrentProcess.KERNEL32 ref: 012EB80A
                                  • GetCurrentThreadId.KERNEL32 ref: 012EB863
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID: cU2
                                  • API String ID: 2063062207-1859488926
                                  • Opcode ID: 2b8a591d4d992bdd578cdcfd2e0803ea6d8e2d6fff4f2a422c27b43e9e322589
                                  • Instruction ID: fddcc2e603af4b99437d576fea9d1b6e564439674900739c98359c541cb44c50
                                  • Opcode Fuzzy Hash: 2b8a591d4d992bdd578cdcfd2e0803ea6d8e2d6fff4f2a422c27b43e9e322589
                                  • Instruction Fuzzy Hash: 385144B4D006498FDB14CFAAD588BDEBBF1BF89314F24855AE409A73A0D7349884CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 19 12efd8c-12efdfe 20 12efe09-12efe10 19->20 21 12efe00-12efe06 19->21 22 12efe1b-12efe53 20->22 23 12efe12-12efe18 20->23 21->20 24 12efe5b-12efeba CreateWindowExW 22->24 23->22 25 12efebc-12efec2 24->25 26 12efec3-12efefb 24->26 25->26 30 12efefd-12eff00 26->30 31 12eff08 26->31 30->31 32 12eff09 31->32 32->32
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 012EFEAA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: cU2$cU2
                                  • API String ID: 716092398-903890455
                                  • Opcode ID: a3e32ca7a62813fb1c890c5908b994c6e8d2fe92385761dd63e393ae395c6384
                                  • Instruction ID: 5fe44164f1e0dda07ab6d552e6e101d9b06fb0022000618f424df87a8cbed6c7
                                  • Opcode Fuzzy Hash: a3e32ca7a62813fb1c890c5908b994c6e8d2fe92385761dd63e393ae395c6384
                                  • Instruction Fuzzy Hash: A851D0B1D10309DFDB14CFA9D984ADEBBF5BF88314F64812AE819AB250D770A845CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 33 12efd98-12efdfe 34 12efe09-12efe10 33->34 35 12efe00-12efe06 33->35 36 12efe1b-12efeba CreateWindowExW 34->36 37 12efe12-12efe18 34->37 35->34 39 12efebc-12efec2 36->39 40 12efec3-12efefb 36->40 37->36 39->40 44 12efefd-12eff00 40->44 45 12eff08 40->45 44->45 46 12eff09 45->46 46->46
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 012EFEAA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: cU2$cU2
                                  • API String ID: 716092398-903890455
                                  • Opcode ID: 01260a44d6de742315eab73c69a1e1a0306a241b2055530a423d1b9d2dff1e04
                                  • Instruction ID: ea8eeee9c0a223fa2207ad7ca325b6e8f9c933306459706fc0e42755296774ba
                                  • Opcode Fuzzy Hash: 01260a44d6de742315eab73c69a1e1a0306a241b2055530a423d1b9d2dff1e04
                                  • Instruction Fuzzy Hash: CA41CEB1D103099FDB14CF9AD984ADEBBF5BF48310F64812AE819AB250D770A945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 85 12e9730-12e9738 86 12e9743-12e9745 85->86 87 12e973e call 12e8184 85->87 88 12e975b-12e975f 86->88 89 12e9747 86->89 87->86 90 12e9773-12e97b4 88->90 91 12e9761-12e976b 88->91 138 12e974d call 12e99b8 89->138 139 12e974d call 12e99a9 89->139 96 12e97b6-12e97be 90->96 97 12e97c1-12e97cf 90->97 91->90 92 12e9753-12e9755 92->88 93 12e9890-12e9950 92->93 133 12e9958-12e9983 GetModuleHandleW 93->133 134 12e9952-12e9955 93->134 96->97 99 12e97f3-12e97f5 97->99 100 12e97d1-12e97d6 97->100 103 12e97f8-12e97ff 99->103 101 12e97d8-12e97df call 12e8190 100->101 102 12e97e1 100->102 108 12e97e3-12e97f1 101->108 102->108 104 12e980c-12e9813 103->104 105 12e9801-12e9809 103->105 109 12e9815-12e981d 104->109 110 12e9820-12e9829 call 12e81a0 104->110 105->104 108->103 109->110 115 12e982b-12e9833 110->115 116 12e9836-12e983b 110->116 115->116 118 12e983d-12e9844 116->118 119 12e9859-12e985d 116->119 118->119 120 12e9846-12e9856 call 12e931c call 12e932c 118->120 140 12e9860 call 12e9cb3 119->140 141 12e9860 call 12e9cc0 119->141 120->119 122 12e9863-12e9866 124 12e9868-12e9886 122->124 125 12e9889-12e988f 122->125 124->125 135 12e998c-12e99a0 133->135 136 12e9985-12e998b 133->136 134->133 136->135 138->92 139->92 140->122 141->122
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 012E9976
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: cU2
                                  • API String ID: 4139908857-1859488926
                                  • Opcode ID: 5d7406bd8e0f31ee7d81e5bc8c361e23a0cd7e9c0ea153d45d94a9d5ae7f6010
                                  • Instruction ID: fcbe233f12df37296455db3fd269a7827769e8ce0613dd3f83cea20bd76f6299
                                  • Opcode Fuzzy Hash: 5d7406bd8e0f31ee7d81e5bc8c361e23a0cd7e9c0ea153d45d94a9d5ae7f6010
                                  • Instruction Fuzzy Hash: 29716970A10B068FDB24DF6AD04879ABBF1FF88204F50892ED58AD7A50D735E849CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 142 12e38bc-12e5451 CreateActCtxA 145 12e545a-12e54b4 142->145 146 12e5453-12e5459 142->146 153 12e54b6-12e54b9 145->153 154 12e54c3-12e54c7 145->154 146->145 153->154 155 12e54d8 154->155 156 12e54c9-12e54d5 154->156 158 12e54d9 155->158 156->155 158->158
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 012E5441
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID: cU2
                                  • API String ID: 2289755597-1859488926
                                  • Opcode ID: 5dd14b88b475c7cf2d3487b980898926e3af520e8d2a7e25b589e483b8314709
                                  • Instruction ID: 78a29657c74016f297a51947d17fdc50853c663f7f7ef1b189c4e96add716a11
                                  • Opcode Fuzzy Hash: 5dd14b88b475c7cf2d3487b980898926e3af520e8d2a7e25b589e483b8314709
                                  • Instruction Fuzzy Hash: 7141F1B4D1021CCBDB24CFAAC888BDEBBF5BF48308F60846AD409AB251D7706945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 159 12e538b-12e5451 CreateActCtxA 161 12e545a-12e54b4 159->161 162 12e5453-12e5459 159->162 169 12e54b6-12e54b9 161->169 170 12e54c3-12e54c7 161->170 162->161 169->170 171 12e54d8 170->171 172 12e54c9-12e54d5 170->172 174 12e54d9 171->174 172->171 174->174
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 012E5441
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID: cU2
                                  • API String ID: 2289755597-1859488926
                                  • Opcode ID: d428be2e41ac7bbcec88ee929bc1d9aaee837ace331c1c866b4d3887db0f7e9e
                                  • Instruction ID: ba8c92cd19c2ba9ea913bc7c2abbc03bebc50963aee6131596852d6649864d1c
                                  • Opcode Fuzzy Hash: d428be2e41ac7bbcec88ee929bc1d9aaee837ace331c1c866b4d3887db0f7e9e
                                  • Instruction Fuzzy Hash: 154102B0C10219CFDF24CFAAC884BDEBBB5BF48308F60846AD449AB251D7715946CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 175 12eb958-12eb9ec DuplicateHandle 176 12eb9ee-12eb9f4 175->176 177 12eb9f5-12eba12 175->177 176->177
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012EB9DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID: cU2
                                  • API String ID: 3793708945-1859488926
                                  • Opcode ID: 7e57e221eee155037afa4cce481ce9b7e9ba4de112e84b388b26308dc0396a9e
                                  • Instruction ID: 813f54a565e90ca08fbc58fa4e38dc0675647fc5086c705c8b8fc059a66641e2
                                  • Opcode Fuzzy Hash: 7e57e221eee155037afa4cce481ce9b7e9ba4de112e84b388b26308dc0396a9e
                                  • Instruction Fuzzy Hash: 7A21E2B59002099FDB10CFAAD984ADEBBF9FB48320F14841AE914A3350D374A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 180 12e9348-12e9bd8 182 12e9bda-12e9bdd 180->182 183 12e9be0-12e9c0f LoadLibraryExW 180->183 182->183 184 12e9c18-12e9c35 183->184 185 12e9c11-12e9c17 183->185 185->184
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012E99F1,00000800,00000000,00000000), ref: 012E9C02
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: cU2
                                  • API String ID: 1029625771-1859488926
                                  • Opcode ID: f8438eb65d62ec0f1b68b56e8c7744661decf472a29b7931150b9f4056f9f5fa
                                  • Instruction ID: b60a6df1a18b4d5d4535b045edbd7757bf961116576e3b5f19418897716bfd3f
                                  • Opcode Fuzzy Hash: f8438eb65d62ec0f1b68b56e8c7744661decf472a29b7931150b9f4056f9f5fa
                                  • Instruction Fuzzy Hash: ED1103B69002098FDF10CF9AD448ADEFBF8AB48314F54842EE519A7200D374A985CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 188 12e9910-12e9950 189 12e9958-12e9983 GetModuleHandleW 188->189 190 12e9952-12e9955 188->190 191 12e998c-12e99a0 189->191 192 12e9985-12e998b 189->192 190->189 192->191
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 012E9976
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: cU2
                                  • API String ID: 4139908857-1859488926
                                  • Opcode ID: 444cc7a187bff2bec6a3d2031041590928455a3b52d46e2463f133c5010abc81
                                  • Instruction ID: 29026ae611fbb4360e3ff07aea830e2efc4871fde81519917adb8c2886add55a
                                  • Opcode Fuzzy Hash: 444cc7a187bff2bec6a3d2031041590928455a3b52d46e2463f133c5010abc81
                                  • Instruction Fuzzy Hash: 6B1113B5C0024A8FDB10CF9AD444BDEFBF4AF88324F14851AD569B7200D378A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c93b60054ae54a551c6820903a75940a2ebc8c0e01f07868f783f45f0912f1ab
                                  • Instruction ID: 586a8656c611e6d2bc9a153a3f52a7eb20bc0d3b6d702448540ea2dfab331726
                                  • Opcode Fuzzy Hash: c93b60054ae54a551c6820903a75940a2ebc8c0e01f07868f783f45f0912f1ab
                                  • Instruction Fuzzy Hash: 5E12AAF1621F468FD334CFAAEC981893B61B755319B924208D2721EAD9E7F4214EEF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56b45562c440e4a7318a7f22af4f93b7c7e61ab4c402b59e980006ac8769bae7
                                  • Instruction ID: daa67a3b2952d448a68c6e423725eff4401635e91f1d6d00a1d9ee4395c5df41
                                  • Opcode Fuzzy Hash: 56b45562c440e4a7318a7f22af4f93b7c7e61ab4c402b59e980006ac8769bae7
                                  • Instruction Fuzzy Hash: DFA17032E1021A8FCF15DFF5C8485DEBBF2FF84300B55856AE905AB221EB71A955CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.340678201.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12e0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 099f891c1eba37bf5706a937100c7734b0aa34635adf8491618c05337ba124c1
                                  • Instruction ID: c13a82aa1af7bd38c74e1eb7ee29f8614d5c88bafef4d4d40adf2805a8b8632c
                                  • Opcode Fuzzy Hash: 099f891c1eba37bf5706a937100c7734b0aa34635adf8491618c05337ba124c1
                                  • Instruction Fuzzy Hash: 29C10BB1621B458FD720CFAAE8981897B71BB85329B524309D1726F6D8E7F4204EEF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:13.4%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:7%
                                  Total number of Nodes:43
                                  Total number of Limit Nodes:4
                                  execution_graph 14032 6921670 14033 6921685 14032->14033 14037 6921788 14033->14037 14050 6921778 14033->14050 14034 69216dd 14047 6921788 5 API calls 14037->14047 14048 6921778 5 API calls 14037->14048 14063 6921878 14037->14063 14067 692185b 14037->14067 14071 6921895 14037->14071 14038 692179c 14040 69217d3 14038->14040 14075 6920e74 14038->14075 14040->14034 14041 6921834 14041->14034 14043 6921ba6 GetSystemTimes 14044 6921be3 14043->14044 14044->14034 14047->14038 14048->14038 14051 692179c 14050->14051 14058 6921895 GetSystemTimes 14050->14058 14059 692185b GetSystemTimes 14050->14059 14060 6921788 5 API calls 14050->14060 14061 6921778 5 API calls 14050->14061 14062 6921878 GetSystemTimes 14050->14062 14052 6920e74 GetSystemTimes 14051->14052 14053 69217d3 14051->14053 14055 6921830 14052->14055 14053->14034 14054 6921834 14054->14034 14055->14054 14056 6921ba6 GetSystemTimes 14055->14056 14057 6921be3 14056->14057 14057->14034 14058->14051 14059->14051 14060->14051 14061->14051 14062->14051 14064 692188a GetSystemTimes 14063->14064 14066 6921be3 14064->14066 14066->14038 14068 692186d GetSystemTimes 14067->14068 14070 6921be3 14068->14070 14070->14038 14074 69218a7 14071->14074 14072 6921ba6 GetSystemTimes 14073 6921be3 14072->14073 14073->14038 14074->14038 14074->14072 14076 6921b58 GetSystemTimes 14075->14076 14078 6921830 14076->14078 14078->14041 14078->14043 14024 6926918 14025 6926936 14024->14025 14028 6925a94 14025->14028 14027 692696d 14029 6928438 LoadLibraryA 14028->14029 14031 6928514 14029->14031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 921 6920e74-6921be1 GetSystemTimes 924 6921be3-6921be9 921->924 925 6921bea-6921c0b 921->925 924->925
                                  APIs
                                  • GetSystemTimes.KERNELBASE(?,?,?), ref: 06921BD4
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: SystemTimes
                                  • String ID:
                                  • API String ID: 375623090-0
                                  • Opcode ID: a8021a7c69a3bbcd01a061c67a07a22a606aa522b841e307521ed4e33f154e4c
                                  • Instruction ID: 0e5943ad88eef8a203b7530ab176629d5f36af43f560143128d7a1747f31ac10
                                  • Opcode Fuzzy Hash: a8021a7c69a3bbcd01a061c67a07a22a606aa522b841e307521ed4e33f154e4c
                                  • Instruction Fuzzy Hash: 3F21E4B1D012199FDB40CFA9D584BDEFBF8EB48310F24806AE908AB245E3749945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 122 6921895-69218a1 123 6921b42-6921be1 GetSystemTimes 122->123 124 69218a7-69218b3 122->124 130 6921be3-6921be9 123->130 131 6921bea-6921c0b 123->131 124->123 125 69218b9-69219f7 124->125 134 6921a19-6921a32 125->134 135 69219f9-6921a17 125->135 130->131 136 6921a37-6921b0e 134->136 135->136 136->123
                                  APIs
                                  • GetSystemTimes.KERNELBASE(?,?,?), ref: 06921BD4
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: SystemTimes
                                  • String ID:
                                  • API String ID: 375623090-0
                                  • Opcode ID: 9b92516ecfb5cf5ec37dbd832d64c07d7af1db9fea32e76d4999cb73b539fa8a
                                  • Instruction ID: 4fd2d1ee9f0f5927193bce9a6e98338f278fcc434c2f6a32512ec289d4fb5b05
                                  • Opcode Fuzzy Hash: 9b92516ecfb5cf5ec37dbd832d64c07d7af1db9fea32e76d4999cb73b539fa8a
                                  • Instruction Fuzzy Hash: 04B1BE75D0021ACFDB51CFA8C880AD9FBB5FF49310F14C69AD958AB205E770AA85CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 139 6921788-6921794 162 6921796 call 6921895 139->162 163 6921796 call 692185b 139->163 164 6921796 call 6921788 139->164 165 6921796 call 6921778 139->165 166 6921796 call 6921878 139->166 140 692179c-69217d1 144 69217d3-69217e8 140->144 145 69217ea-6921832 call 6920e74 140->145 152 6921834-692183d 145->152 153 692183e-692184a 145->153 154 6921b42-6921be1 GetSystemTimes 153->154 155 6921850-6921b18 153->155 159 6921be3-6921be9 154->159 160 6921bea-6921c0b 154->160 155->154 159->160 162->140 163->140 164->140 165->140 166->140
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 209f922b15263ae975398f06169523e4f9fb413c2d1e830a2063c0d2c061065d
                                  • Instruction ID: 3a5889d161c62a256407390da4875187ec5d1f39779da01c084689c1ac78438a
                                  • Opcode Fuzzy Hash: 209f922b15263ae975398f06169523e4f9fb413c2d1e830a2063c0d2c061065d
                                  • Instruction Fuzzy Hash: AC512F30E012198FDB00DFA8E8846EEFFF4EF89310F2045AAE554A7345D7349919CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 243 692842c-692848f 245 6928491-692849b 243->245 246 69284c8-6928512 LoadLibraryA 243->246 245->246 247 692849d-692849f 245->247 251 6928514-692851a 246->251 252 692851b-692854c 246->252 249 69284c2-69284c5 247->249 250 69284a1-69284ab 247->250 249->246 253 69284af-69284be 250->253 254 69284ad 250->254 251->252 258 692854e-6928552 252->258 259 692855c 252->259 253->253 255 69284c0 253->255 254->253 255->249 258->259 260 6928554 258->260 261 692855d 259->261 260->259 261->261
                                  APIs
                                  • LoadLibraryA.KERNELBASE(?), ref: 06928502
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 9502605b90a6f099010d42a072e9b8ef8fdab3b4a9d82fd55d5df34c783e2fcc
                                  • Instruction ID: b79f39ac0d1ce7349116ff283711662424ec4b8ae937adef19f7a2e046be206a
                                  • Opcode Fuzzy Hash: 9502605b90a6f099010d42a072e9b8ef8fdab3b4a9d82fd55d5df34c783e2fcc
                                  • Instruction Fuzzy Hash: 023188B0D0025A8FDB50CFA8C984BDEBBF5BB08314F148529E816EB784D7789489CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 262 6925a94-692848f 264 6928491-692849b 262->264 265 69284c8-6928512 LoadLibraryA 262->265 264->265 266 692849d-692849f 264->266 270 6928514-692851a 265->270 271 692851b-692854c 265->271 268 69284c2-69284c5 266->268 269 69284a1-69284ab 266->269 268->265 272 69284af-69284be 269->272 273 69284ad 269->273 270->271 277 692854e-6928552 271->277 278 692855c 271->278 272->272 274 69284c0 272->274 273->272 274->268 277->278 279 6928554 277->279 280 692855d 278->280 279->278 280->280
                                  APIs
                                  • LoadLibraryA.KERNELBASE(?), ref: 06928502
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 0f37c73ce4d6f9d707989370d0d53ac8f142f8dbb0d2421816ffc467113df78b
                                  • Instruction ID: 63a13d058dafada092df247f44d53814fd7c582f0b2b1ad6c9bf3db9623e2b36
                                  • Opcode Fuzzy Hash: 0f37c73ce4d6f9d707989370d0d53ac8f142f8dbb0d2421816ffc467113df78b
                                  • Instruction Fuzzy Hash: B63159B0D1026A8FDB50CFA8C984B9EBBF5BB08314F148529E816EB744D7749849CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 903 692185b-6921867 904 6921b42-6921be1 GetSystemTimes 903->904 905 692186d-6921b29 903->905 909 6921be3-6921be9 904->909 910 6921bea-6921c0b 904->910 905->904 909->910
                                  APIs
                                  • GetSystemTimes.KERNELBASE(?,?,?), ref: 06921BD4
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: SystemTimes
                                  • String ID:
                                  • API String ID: 375623090-0
                                  • Opcode ID: e87c27cc5f908786faf6a1ff8a7019752aabadecb09018864357df33cc245079
                                  • Instruction ID: 7bb22bbdb88475f09300aa8e77411af96d7e028df6492fa1d49e9653e0926ba1
                                  • Opcode Fuzzy Hash: e87c27cc5f908786faf6a1ff8a7019752aabadecb09018864357df33cc245079
                                  • Instruction Fuzzy Hash: 153133B4D0124A8FCB40CFA8D480ADEFFF4AF49310F24819AE554AB255D3389846CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 912 6921878-6921884 913 6921b42-6921be1 GetSystemTimes 912->913 914 692188a-6921b3a 912->914 918 6921be3-6921be9 913->918 919 6921bea-6921c0b 913->919 914->913 918->919
                                  APIs
                                  • GetSystemTimes.KERNELBASE(?,?,?), ref: 06921BD4
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID: SystemTimes
                                  • String ID:
                                  • API String ID: 375623090-0
                                  • Opcode ID: 440a055a83e592000d6505dd638c4ca7c5daa4893f57ac447db39e899af56b55
                                  • Instruction ID: 2c78889d902633e353813408e29abae69bc115b5044df8db2da22116567f3696
                                  • Opcode Fuzzy Hash: 440a055a83e592000d6505dd638c4ca7c5daa4893f57ac447db39e899af56b55
                                  • Instruction Fuzzy Hash: A63132B4D012598FCB40CFA8D580ADDFBF4BF49310F24819AE554AB256D3349846CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: h?Hl
                                  • API String ID: 0-2353351203
                                  • Opcode ID: b9425834c5241bbbe62536c35e2997b0f1b576bb399bb9b4ffd3b69a1a5024be
                                  • Instruction ID: 4b72b4183580d7140b4407408122a4d25e519639ba613e52e0aa9fef0e5d0a03
                                  • Opcode Fuzzy Hash: b9425834c5241bbbe62536c35e2997b0f1b576bb399bb9b4ffd3b69a1a5024be
                                  • Instruction Fuzzy Hash: 9F21E531B101108FC704DB79D8889AAB7BAEF89724B2181B9D559CB3A1DB34EC06CBD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d68eb3e1894569b90680d713e62aba2af25c3cac7a15dc0db96c45ff4fd457b
                                  • Instruction ID: 5320e37cc2a8b09da97e830e6035f258701e87db21e4988fc3b28990769593ac
                                  • Opcode Fuzzy Hash: 1d68eb3e1894569b90680d713e62aba2af25c3cac7a15dc0db96c45ff4fd457b
                                  • Instruction Fuzzy Hash: B2213431B14B104FC324EBA8982069EB3EBAFC5214318893ED50ACB795DF31EC0287D0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 346ab9fca0d365e47e2a8da9196dce7c5c483ebccb30aeaf2d7e809bc2e398a2
                                  • Instruction ID: dce827fc4bb44bef366c39b62dd6158fd42bee1fce7814817b249d2df9207c58
                                  • Opcode Fuzzy Hash: 346ab9fca0d365e47e2a8da9196dce7c5c483ebccb30aeaf2d7e809bc2e398a2
                                  • Instruction Fuzzy Hash: 68315C75E002189FDB14DFA9D448B9EBBF9AF48714F24846AE406A7350CF78A846CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2c876044fdb3ca9656e1e769a4991ec6806f1cc17507897974ca9883214177ea
                                  • Instruction ID: c982bbb9193c06f7f2083e0dfcf8cc85104f532ad9d90fca8b175d0953a7b444
                                  • Opcode Fuzzy Hash: 2c876044fdb3ca9656e1e769a4991ec6806f1cc17507897974ca9883214177ea
                                  • Instruction Fuzzy Hash: FA31E4343242108FC714EB38D458A9977E6EF8A719B2544ADE14ACF7A2CF72DC05CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e1313b9d32d7458cbd64c3176b2204d62cbefd61ae04a92f470ab18e75f34036
                                  • Instruction ID: 9d5d32964f257b9b3c08159fdd504631548d675eb645a260a2a5d7c021ae6822
                                  • Opcode Fuzzy Hash: e1313b9d32d7458cbd64c3176b2204d62cbefd61ae04a92f470ab18e75f34036
                                  • Instruction Fuzzy Hash: 1A216D31B042189FC714AFB6A40866E7BEAEF85306B108469D017DB784DF7D9D46CF52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.548394052.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_f0d000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 64a8a9b371c3fff58c432433718de4131371032328157e27736f7aab1ced64d9
                                  • Instruction ID: ba8d67c259f3065545452b8b128988834cbc2d734a929a64b903040992cbfca3
                                  • Opcode Fuzzy Hash: 64a8a9b371c3fff58c432433718de4131371032328157e27736f7aab1ced64d9
                                  • Instruction Fuzzy Hash: 502106B6904244DFDB11CF94D9C0B66BB65FB84328F288569EC090B286C336D845FBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.548419928.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_f1d000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22290b13491550236d8097ed9ff5121207b0c51c07bc55f4ce228d2352472861
                                  • Instruction ID: d106d1ab3e4b74a0d4396de85431816fa57e0b9996177da7516125e0200a5af5
                                  • Opcode Fuzzy Hash: 22290b13491550236d8097ed9ff5121207b0c51c07bc55f4ce228d2352472861
                                  • Instruction Fuzzy Hash: C421F5B6904244DFDB14CF24D8C4B96BB75FB88324F24C969D8494B24AC336D887DA61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4b8b9842ce458d0bcad69fa04dfb8bb532bd997f98b0e981de029cc3ea71e49b
                                  • Instruction ID: d457feb3fe023e40df7c0e59076602d73925f6e37d1877eafd9c3cba33ca4c4d
                                  • Opcode Fuzzy Hash: 4b8b9842ce458d0bcad69fa04dfb8bb532bd997f98b0e981de029cc3ea71e49b
                                  • Instruction Fuzzy Hash: EB11AF327001249FC708EBA9D89497E73EFEFC86143248529E506DF391DF36AC029BA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.548419928.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_f1d000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 86f440d826399b266d6c6c444f4d44bea6105741e866b2d96db884d498dc4570
                                  • Instruction ID: bdb1822cc5002574bcecc5454936f40b5db8da478c5507e40d100212e95d193a
                                  • Opcode Fuzzy Hash: 86f440d826399b266d6c6c444f4d44bea6105741e866b2d96db884d498dc4570
                                  • Instruction Fuzzy Hash: 9A2180755093C08FCB02CF24D990755BF71EB46324F28C5EAD8498F697C33A984ADB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 08705363f965fe718e16c1040c39d4c98ca8f2cd10bbe5806359fb69309d698c
                                  • Instruction ID: 92ab0ab23f7335a7d06943f1685aab5ce0f70f1fc3e4eb68e9a9c88a989549fd
                                  • Opcode Fuzzy Hash: 08705363f965fe718e16c1040c39d4c98ca8f2cd10bbe5806359fb69309d698c
                                  • Instruction Fuzzy Hash: 9911C1393042048BE614A769D0145BE739FDFD12187A48A6DE00E9B780DF7AEC038B92
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37ec1f50fec34534cb8f638d8648315eb0e01a0a5df510f9ee4b5958a1ba8a01
                                  • Instruction ID: 881ebe14cc7dc9af69790e02c28881b8208cb83d9d4c5ba7887c89f5f5b8941e
                                  • Opcode Fuzzy Hash: 37ec1f50fec34534cb8f638d8648315eb0e01a0a5df510f9ee4b5958a1ba8a01
                                  • Instruction Fuzzy Hash: 58118C38700601ABD624DA5AC880D7AF3AFFFC9264B24C51AD45A87B95CB75FC42CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.548394052.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_f0d000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14d24104e7c3173a843a0472e1518ad77889c4c6c77b39ebf8477dc8966a5350
                                  • Instruction ID: 503ec6b997401d173ef1cab8f5b4ac338915a70950ddc5efdcd606d60e7b77a7
                                  • Opcode Fuzzy Hash: 14d24104e7c3173a843a0472e1518ad77889c4c6c77b39ebf8477dc8966a5350
                                  • Instruction Fuzzy Hash: 6A11B176804280CFDF12CF54D9C4B66BF71FB84324F2886A9DC050B656C336D85AEBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 79389ba3c24c215664b233e8e71855015a77c2a9db23f2b1f19bb44ab682d5e9
                                  • Instruction ID: abf7ca103d2f36157698a96bc579276b86bf7bfbb179ddc0aeca1763b4d48f35
                                  • Opcode Fuzzy Hash: 79389ba3c24c215664b233e8e71855015a77c2a9db23f2b1f19bb44ab682d5e9
                                  • Instruction Fuzzy Hash: 9001A7613051689BE718A7789C1475FD9CF9FCC648F20C42DA10BD73D9CD645C0543BA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c845e6a58f0fbc61d52b6fb3d1a01edb533ffdbc024d334c878b11ae5a5d43d6
                                  • Instruction ID: e2113ee9bbc61f5d75a235bb84744b447a0e779944565017f3b80250ef97aede
                                  • Opcode Fuzzy Hash: c845e6a58f0fbc61d52b6fb3d1a01edb533ffdbc024d334c878b11ae5a5d43d6
                                  • Instruction Fuzzy Hash: EC110A746043949FE311EB64E0586753BF7EF05305B404598D0859F3A5CB38AC86CF84
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ca70376f26ae6cc62b9e8203c029dcf564a9e1e7c878cc57319290669e76afb
                                  • Instruction ID: 09a51ac1e54a6c5b345fbaca951756628ab282e76cd11f389aee438bc6d45d40
                                  • Opcode Fuzzy Hash: 4ca70376f26ae6cc62b9e8203c029dcf564a9e1e7c878cc57319290669e76afb
                                  • Instruction Fuzzy Hash: EAF0B432F50A218B8774DA689C10A9B73EBAF89710704863ED549C7758DF35F84287D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5be7fda61585ea95248f4e1116975cf8aad98c0a80bc3894b824612e97033a4c
                                  • Instruction ID: 5d8504cd4cf176ef01220a5d84bb54b766edc8d43573dbba341b303c0453b6bd
                                  • Opcode Fuzzy Hash: 5be7fda61585ea95248f4e1116975cf8aad98c0a80bc3894b824612e97033a4c
                                  • Instruction Fuzzy Hash: 62F05C713057441BC324DB6AAC40846FFEEEFC2114325896EE18ECB616DA219D0887F1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a10149c995826f9c4d8ce8b59c7218fa85e089285f4aeb86f91b9d450a7d7b0c
                                  • Instruction ID: 0fd32c0f3462132ef0d9877bf158b860b5cfdde68604771d89833875676c6e60
                                  • Opcode Fuzzy Hash: a10149c995826f9c4d8ce8b59c7218fa85e089285f4aeb86f91b9d450a7d7b0c
                                  • Instruction Fuzzy Hash: F0F07436700A049F8364DA5EE544C57F7FAEFC9621325C96AE59EC3B24DA30F8058BA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dac566c6207744c180dfb852448be515aca03650a6eee36601ba8f6dea580439
                                  • Instruction ID: 9b2b25b72ad2f9071fb7323481e5aaaa5846ca6557898d41b2d12758801a9bd7
                                  • Opcode Fuzzy Hash: dac566c6207744c180dfb852448be515aca03650a6eee36601ba8f6dea580439
                                  • Instruction Fuzzy Hash: ACF05C3260D7561F932A5B74DD1469FBBA79E47160305039ADD91CB7E2DF14AC02C3E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8fb3d14885381273bf715ea716998b5b39bc01205ac9e45912bb7034e7f4f403
                                  • Instruction ID: ae8f4a9ead1757798ad688eac9462be6f734cb4fb168283f03410a9ea65ad1b2
                                  • Opcode Fuzzy Hash: 8fb3d14885381273bf715ea716998b5b39bc01205ac9e45912bb7034e7f4f403
                                  • Instruction Fuzzy Hash: 67E01AB0D0021ADFD780EFA8D81179EBBF1AF08204F108D69D209E7311E7B186028F91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f514e49e77e309881e07935a194771b4c0e4a1f4f5c816eb25998fa851a89e6
                                  • Instruction ID: c1d7b06a6a46404ce3c76b974a1064618ca3c625562ac280f44355a9a9d965c4
                                  • Opcode Fuzzy Hash: 8f514e49e77e309881e07935a194771b4c0e4a1f4f5c816eb25998fa851a89e6
                                  • Instruction Fuzzy Hash: F5D02B3312D3449FD74AC750AC055A137AB8781F007018046E0458719AD9612C4941F1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f062079bfb6272934ff9b24b69ef3180229ccc579f0364d9893622444bbe68c
                                  • Instruction ID: c6f3e3cdce2229aad9e6d3caa5f876cf40b5f253e5488796dbedecc0ac9d52c4
                                  • Opcode Fuzzy Hash: 7f062079bfb6272934ff9b24b69ef3180229ccc579f0364d9893622444bbe68c
                                  • Instruction Fuzzy Hash: DBD05E327290249F9B04E668AD60C6832AF9F8965A30000AAE10ACB350DD9AAC018381
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dda3a99d2d0d98c13888c2a35f788041d998ffc906740632882a33e352e6cb75
                                  • Instruction ID: 4d3d82ffc9660fe2b8619cfbfb6d4ce6ee2450562db0e282de0e01820de70fb8
                                  • Opcode Fuzzy Hash: dda3a99d2d0d98c13888c2a35f788041d998ffc906740632882a33e352e6cb75
                                  • Instruction Fuzzy Hash: 58E0ECB0D1020ADED780EFA8C81179EBBF4BF04204F108969C115E6351E7B586058F91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 23e8951fc6e6da9abb7a6d1029f9b9c3484176179454f14eb211014d107fa311
                                  • Instruction ID: fbe0014b2394f454b596d20eff3c6d5e48939a0380b01a617e8e542b62465ce9
                                  • Opcode Fuzzy Hash: 23e8951fc6e6da9abb7a6d1029f9b9c3484176179454f14eb211014d107fa311
                                  • Instruction Fuzzy Hash: DFC08C3223C308DBEB58D7956C45972339B8BC8F00B00C014B20A16998CAB17C420090
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553983749.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6ff0000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d438abfcdbfdcb41a342f5cd90f5454f2fb7adea46cf31c100860d6744701dad
                                  • Instruction ID: 93db1c4e2908323a17a4a3391a8ea30758cc081b6d0716f1a0c1ba42f85f6195
                                  • Opcode Fuzzy Hash: d438abfcdbfdcb41a342f5cd90f5454f2fb7adea46cf31c100860d6744701dad
                                  • Instruction Fuzzy Hash: 82B0925A00D3818FE38A1E2089302802F7228876403E715DEC0C0CBA67C02A09059662
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.552904564.0000000005F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: true
                                  • Associated: 0000000D.00000002.552875368.0000000005F50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5f50000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7682592e7495b526cc096bd160334116f8e75fb5d2f2b7ac302dfd7aa84ee1d
                                  • Instruction ID: 4df80addb8349479c4350b4625951743dbd61e891da9fb3089b285283e61578a
                                  • Opcode Fuzzy Hash: f7682592e7495b526cc096bd160334116f8e75fb5d2f2b7ac302dfd7aa84ee1d
                                  • Instruction Fuzzy Hash: 1CB0927600CA289F8122EB52DA55C99B76FEA011473904810D102860AC6B6AAE08C9E6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6008763eb413e2a6c63a84fd2a63621f9530dbae87385f5af21a3a8d13cb5e99
                                  • Instruction ID: 47dde3bc6f807839e081b1fad2bdd48c51c44561324d58f9804739147cdadace
                                  • Opcode Fuzzy Hash: 6008763eb413e2a6c63a84fd2a63621f9530dbae87385f5af21a3a8d13cb5e99
                                  • Instruction Fuzzy Hash: 3001B131D062589ECB049FA9E8287EEBFF9EF8A311F14542AE544B3184CB314984CB78
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8745397951799f4fa1c87d2fcde5f22e30f7a19c2e66b18baa18f9518feba681
                                  • Instruction ID: 280a6750b080fac2d3e19c0c0974993881194c2cdd2368a6e42be441d95836d4
                                  • Opcode Fuzzy Hash: 8745397951799f4fa1c87d2fcde5f22e30f7a19c2e66b18baa18f9518feba681
                                  • Instruction Fuzzy Hash: C6F0A431D022248FCB049FA5E4187EDFBF9EF8E312F145429D504B3294DB344948CB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.553685568.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_6920000_HOANG HA TRADING - PRODUCTS LIST.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6241500a26ba78d355d15deaec86bfe8b9331b6cdbe1495a116279eea52ba49
                                  • Instruction ID: cced8257c752fd07b7c72443661f9241d0c32a512acf73fbfa7c5bc63d0d1710
                                  • Opcode Fuzzy Hash: c6241500a26ba78d355d15deaec86bfe8b9331b6cdbe1495a116279eea52ba49
                                  • Instruction Fuzzy Hash: 24E0B635E251299F8B00EFE8F5548ECB7B1FF8A211F016466D516B3244D7305914CB54
                                  Uniqueness

                                  Uniqueness Score: -1.00%