Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bank Details.exe

Overview

General Information

Sample Name:Bank Details.exe
Analysis ID:624809
MD5:e62e3496deb3ee2c512ca61cf2642a0d
SHA1:2b7942225b4d43ec944622e2b80d0d18c5376f70
SHA256:a9ee1fbee3b6bd1c9c449774b8ed2f02fb89bde7cbf72b2e348c61240971238e
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Bank Details.exe (PID: 1900 cmdline: "C:\Users\user\Desktop\Bank Details.exe" MD5: E62E3496DEB3EE2C512CA61CF2642A0D)
    • powershell.exe (PID: 580 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 4192 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmpEA4C.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Bank Details.exe (PID: 3560 cmdline: C:\Users\user\Desktop\Bank Details.exe MD5: E62E3496DEB3EE2C512CA61CF2642A0D)
  • dhcpmon.exe (PID: 6400 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: E62E3496DEB3EE2C512CA61CF2642A0D)
    • powershell.exe (PID: 6572 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6588 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmp5C9D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 6784 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E62E3496DEB3EE2C512CA61CF2642A0D)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "55e3c1f3-bf1e-4980-afea-8df9e139", "Group": "Default", "Domain1": "chima2022.ddns.net", "Domain2": "", "Port": 2022, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0xe38:$x2: NanoCore.ClientPlugin
  • 0xe75:$x3: NanoCore.ClientPluginHost
  • 0xe5a:$i1: IClientApp
  • 0xe4e:$i2: IClientData
  • 0xe29:$i3: IClientNetwork
  • 0xec3:$i4: IClientAppHost
  • 0xe65:$i5: IClientDataHost
  • 0xeb0:$i6: IClientLoggingHost
  • 0xe8f:$i7: IClientNetworkHost
  • 0xea2:$i8: IClientUIHost
  • 0xed2:$i9: IClientNameObjectCollection
  • 0xef7:$i10: IClientReadOnlyNameObjectCollection
  • 0xe41:$s1: ClientPlugin
  • 0x177c:$s1: ClientPlugin
  • 0x1789:$s1: ClientPlugin
  • 0x11f9:$s6: get_ClientSettings
  • 0x1249:$s7: get_Connected
00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x59eb:$x1: NanoCore.ClientPluginHost
  • 0x5b48:$x2: IClientNetworkHost
00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x59eb:$x2: NanoCore.ClientPluginHost
  • 0x6941:$s3: PipeExists
  • 0x5be1:$s4: PipeCreated
  • 0x5a05:$s5: IClientLoggingHost
Click to see the 107 entries
SourceRuleDescriptionAuthorStrings
8.2.Bank Details.exe.e50000.9.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1deb:$x1: NanoCore.ClientPluginHost
  • 0x1e24:$x2: IClientNetworkHost
8.2.Bank Details.exe.e50000.9.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x1deb:$x2: NanoCore.ClientPluginHost
  • 0x1f36:$s4: PipeCreated
  • 0x1e05:$s5: IClientLoggingHost
8.2.Bank Details.exe.e50000.9.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x1e8b:$x2: NanoCore.ClientPlugin
  • 0x1deb:$x3: NanoCore.ClientPluginHost
  • 0x1ea1:$i3: IClientNetwork
  • 0x1e43:$i5: IClientDataHost
  • 0x1e05:$i6: IClientLoggingHost
  • 0x1e24:$i7: IClientNetworkHost
  • 0x266c:$i9: IClientNameObjectCollection
  • 0x1b41:$s1: ClientPlugin
  • 0x1e94:$s1: ClientPlugin
  • 0x2a80:$s2: EndPoint
  • 0x2771:$s3: IPAddress
  • 0x2083:$s4: IPEndPoint
  • 0x27a3:$s7: get_Connected
8.2.Bank Details.exe.ae0000.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x2dbb:$x1: NanoCore.ClientPluginHost
  • 0x2de5:$x2: IClientNetworkHost
8.2.Bank Details.exe.ae0000.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2dbb:$x2: NanoCore.ClientPluginHost
  • 0x4c6b:$s4: PipeCreated
Click to see the 321 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Bank Details.exe, ProcessId: 3560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Bank Details.exe, ProcessId: 3560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Bank Details.exe, ProcessId: 3560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Bank Details.exe, ProcessId: 3560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.4194.31.98.1164983020222816766 05/12/22-04:19:36.011525
SID:2816766
Source Port:49830
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164977320222816766 05/12/22-04:19:20.018597
SID:2816766
Source Port:49773
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164986320222816766 05/12/22-04:20:10.853853
SID:2816766
Source Port:49863
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022497582841753 05/12/22-04:18:37.050338
SID:2841753
Source Port:2022
Destination Port:49758
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164983320222816766 05/12/22-04:19:42.105532
SID:2816766
Source Port:49833
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164977120222025019 05/12/22-04:19:11.899573
SID:2025019
Source Port:49771
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022497972841753 05/12/22-04:19:25.210300
SID:2841753
Source Port:2022
Destination Port:49797
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164976920222025019 05/12/22-04:18:58.075804
SID:2025019
Source Port:49769
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164976920222816766 05/12/22-04:19:00.725683
SID:2816766
Source Port:49769
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164983320222025019 05/12/22-04:19:41.132097
SID:2025019
Source Port:49833
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022498332841753 05/12/22-04:19:46.171498
SID:2841753
Source Port:2022
Destination Port:49833
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164986320222025019 05/12/22-04:20:10.583511
SID:2025019
Source Port:49863
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164977320222816718 05/12/22-04:19:19.399645
SID:2816718
Source Port:49773
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164977320222025019 05/12/22-04:19:18.977182
SID:2025019
Source Port:49773
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164983020222025019 05/12/22-04:19:35.133701
SID:2025019
Source Port:49830
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164975820222816766 05/12/22-04:18:37.020536
SID:2816766
Source Port:49758
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164976120222816766 05/12/22-04:18:44.803258
SID:2816766
Source Port:49761
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164977120222816766 05/12/22-04:19:12.897247
SID:2816766
Source Port:49771
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022498632810451 05/12/22-04:20:20.632430
SID:2810451
Source Port:2022
Destination Port:49863
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022498632841753 05/12/22-04:20:20.632430
SID:2841753
Source Port:2022
Destination Port:49863
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164983420222025019 05/12/22-04:19:47.368674
SID:2025019
Source Port:49834
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022498162841753 05/12/22-04:19:30.172998
SID:2841753
Source Port:2022
Destination Port:49816
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164985920222816766 05/12/22-04:20:05.810359
SID:2816766
Source Port:49859
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164985420222025019 05/12/22-04:19:56.611527
SID:2025019
Source Port:49854
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164979720222025019 05/12/22-04:19:25.160988
SID:2025019
Source Port:49797
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022498592810290 05/12/22-04:20:04.821759
SID:2810290
Source Port:2022
Destination Port:49859
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164976120222025019 05/12/22-04:18:43.016236
SID:2025019
Source Port:49761
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164976420222025019 05/12/22-04:18:49.975269
SID:2025019
Source Port:49764
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164977020222816766 05/12/22-04:19:06.711904
SID:2816766
Source Port:49770
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164975820222025019 05/12/22-04:18:36.685534
SID:2025019
Source Port:49758
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164983420222816766 05/12/22-04:19:48.215646
SID:2816766
Source Port:49834
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164981620222025019 05/12/22-04:19:30.131962
SID:2025019
Source Port:49816
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164985920222025019 05/12/22-04:20:03.455105
SID:2025019
Source Port:49859
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164977020222025019 05/12/22-04:19:05.824499
SID:2025019
Source Port:49770
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:194.31.98.116192.168.2.42022497642841753 05/12/22-04:18:50.082261
SID:2841753
Source Port:2022
Destination Port:49764
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4194.31.98.1164985420222816766 05/12/22-04:19:58.208455
SID:2816766
Source Port:49854
Destination Port:2022
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "55e3c1f3-bf1e-4980-afea-8df9e139", "Group": "Default", "Domain1": "chima2022.ddns.net", "Domain2": "", "Port": 2022, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
Source: Bank Details.exeReversingLabs: Detection: 12%
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 12%
Source: C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeReversingLabs: Detection: 12%
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTR
Source: Bank Details.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 27.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 8.2.Bank Details.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 8.0.Bank Details.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 8.0.Bank Details.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 27.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 27.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 27.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 8.0.Bank Details.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 8.2.Bank Details.exe.52e0000.34.unpackAvira: Label: TR/NanoCore.fadte
Source: 27.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 27.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 8.0.Bank Details.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 8.0.Bank Details.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: Bank Details.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Bank Details.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: k,C:\Windows\System.pdb source: Bank Details.exe, 00000008.00000002.502757810.000000000674C000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\rzthYHtLly\src\obj\Debug\CreateValueCallb.pdb source: dhcpmon.exe, Bank Details.exe, nOcstjdWFAT.exe.0.dr, dhcpmon.exe.8.dr
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Bank Details.exe, 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_05D8B880
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_05D8B871

Networking

barindex
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49758 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49758 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 194.31.98.116:2022 -> 192.168.2.4:49758
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49761 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49761 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49764 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 194.31.98.116:2022 -> 192.168.2.4:49764
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49769 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49769 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49770 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49770 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49771 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49771 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49773 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49773 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49773 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49797 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 194.31.98.116:2022 -> 192.168.2.4:49797
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49816 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 194.31.98.116:2022 -> 192.168.2.4:49816
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49830 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49830 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49833 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49833 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 194.31.98.116:2022 -> 192.168.2.4:49833
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49834 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49834 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49854 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49854 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49859 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49859 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 194.31.98.116:2022 -> 192.168.2.4:49859
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49863 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49863 -> 194.31.98.116:2022
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 194.31.98.116:2022 -> 192.168.2.4:49863
Source: TrafficSnort IDS: 2810451 ETPRO TROJAN NanoCore RAT Keepalive Response 3 194.31.98.116:2022 -> 192.168.2.4:49863
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.299fe78.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.29ac0c0.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPE
Source: Malware configuration extractorURLs:
Source: Malware configuration extractorURLs: chima2022.ddns.net
Source: unknownDNS query: name: chima2022.ddns.net
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 194.31.98.116:2022
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: Bank Details.exe, 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
Source: Bank Details.exe, 00000000.00000002.280585839.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000002.280695946.0000000002545000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.343046224.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: Bank Details.exe, 00000000.00000003.233452339.00000000053B9000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.233385137.00000000053B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html;
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: Bank Details.exe, 00000000.00000002.284449354.00000000053A0000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.279101275.00000000053A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com(V~
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: Bank Details.exe, 00000000.00000003.229367383.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: Bank Details.exe, 00000000.00000003.229338584.00000000053BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comcxe
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: Bank Details.exe, 00000000.00000003.239877331.00000000053E8000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.239900469.00000000053E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.239968119.00000000053B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: chima2022.ddns.net
Source: Bank Details.exe, 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTR

System Summary

barindex
Source: 8.2.Bank Details.exe.e50000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e50000.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.ae0000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.ae0000.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.50e0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.50e0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.e30000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e30000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.e60000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e60000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.b50000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.b50000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.469cdc1.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.469cdc1.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.e50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.e60000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e60000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.48516d4.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.48516d4.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.5260000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.5260000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.6d941f6.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.6d941f6.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.e80000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e80000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.5264c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.5264c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.6d7cf97.38.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.6d7cf97.38.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.af0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.af0000.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.e80000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e80000.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.e40000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e40000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.299fe78.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.299fe78.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.299fe78.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.ae0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.ae0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.526e8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.526e8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.6d941f6.36.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.6d941f6.36.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.5260000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.5260000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.6d85dc6.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.6d85dc6.37.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.b30000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.b30000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.ea0000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.ea0000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.29c06fc.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.29c06fc.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.29c06fc.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.b40000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.b40000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.46a8ff5.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.46a8ff5.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.299fe78.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.299fe78.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.2.dhcpmon.exe.2e19658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.2.dhcpmon.exe.2e19658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.292c9d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.292c9d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.af0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.af0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.b40000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.b40000.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.29ac0c0.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.29ac0c0.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.b50000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.b50000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.6d85dc6.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.6d85dc6.37.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.e40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.e40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.ea0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.ea0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.29ac0c0.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.29ac0c0.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.29ac0c0.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.6d7cf97.38.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.6d7cf97.38.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.6d7cf97.38.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Bank Details.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 8.2.Bank Details.exe.e50000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e50000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e50000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.ae0000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.ae0000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.ae0000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.50e0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.50e0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.50e0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.e30000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e30000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e30000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.e60000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e60000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e60000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.b50000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.b50000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.b50000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.469cdc1.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.469cdc1.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.469cdc1.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.e50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e50000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.e60000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e60000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e60000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.48516d4.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.48516d4.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.48516d4.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.5260000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.5260000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.5260000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.6d941f6.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.6d941f6.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.6d941f6.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.e80000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e80000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e80000.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.5264c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.5264c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.5264c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.6d7cf97.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.6d7cf97.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.6d7cf97.38.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.af0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.af0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.af0000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.e80000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e80000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e80000.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.e40000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e40000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e40000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.299fe78.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.299fe78.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.299fe78.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.ae0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.ae0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.ae0000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.526e8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.526e8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.526e8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.6d941f6.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.6d941f6.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.6d941f6.36.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.5260000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.5260000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.5260000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.6d85dc6.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.6d85dc6.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.6d85dc6.37.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.b30000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.b30000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.b30000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.48516d4.27.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.ea0000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.ea0000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.ea0000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.29c06fc.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.29c06fc.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.29c06fc.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.29c06fc.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.b40000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.b40000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.b40000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.46a8ff5.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.46a8ff5.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.46a8ff5.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.299fe78.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.299fe78.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.299fe78.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.2.dhcpmon.exe.2e19658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.2.dhcpmon.exe.2e19658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.2.dhcpmon.exe.2e19658.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.292c9d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.292c9d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.292c9d4.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.af0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.af0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.af0000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.b40000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.b40000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.b40000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.29ac0c0.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.29ac0c0.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.29ac0c0.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.b50000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.b50000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.b50000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.6d85dc6.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.6d85dc6.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.6d85dc6.37.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.e40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.e40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.e40000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.ea0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.ea0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.ea0000.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.29ac0c0.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.29ac0c0.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.29ac0c0.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.6d7cf97.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.6d7cf97.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.Bank Details.exe.6d7cf97.38.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.6d7cf97.38.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_00A9E6600_2_00A9E660
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_00A9C67C0_2_00A9C67C
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_00A9E6700_2_00A9E670
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_06E75D510_2_06E75D51
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_06E700400_2_06E70040
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_06E700060_2_06E70006
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_070400060_2_07040006
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_070400400_2_07040040
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_000C22080_2_000C2208
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_028DE4808_2_028DE480
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_028DE4718_2_028DE471
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_028DBBD48_2_028DBBD4
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_05D888C08_2_05D888C0
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_05D895968_2_05D89596
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_05D894D88_2_05D894D8
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_005322088_2_00532208
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_02D1E67020_2_02D1E670
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_02D1C67C20_2_02D1C67C
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_02D1E66020_2_02D1E660
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_0737000620_2_07370006
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_0737004020_2_07370040
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_075495D820_2_075495D8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_0754577720_2_07545777
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_07549F3020_2_07549F30
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_0754004020_2_07540040
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_0754000620_2_07540006
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_00A7220820_2_00A72208
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_052DE47127_2_052DE471
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_052DE48027_2_052DE480
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_052DBBD427_2_052DBBD4
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_0096220827_2_00962208
Source: Bank Details.exeBinary or memory string: OriginalFilename vs Bank Details.exe
Source: Bank Details.exe, 00000000.00000003.253224255.0000000006EA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCreateValueCallb.exeF vs Bank Details.exe
Source: Bank Details.exe, 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Bank Details.exe
Source: Bank Details.exe, 00000000.00000002.284972096.0000000006CF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Bank Details.exe
Source: Bank Details.exeBinary or memory string: OriginalFilename vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000003.430786991.0000000000C93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.495401211.0000000000BBA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000003.285056444.0000000000C32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCreateValueCallb.exeF vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Bank Details.exe
Source: Bank Details.exe, 00000008.00000002.502085437.0000000005D70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Bank Details.exe
Source: Bank Details.exeBinary or memory string: OriginalFilenameCreateValueCallb.exeF vs Bank Details.exe
Source: Bank Details.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: nOcstjdWFAT.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: dhcpmon.exe.8.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: Bank Details.exeReversingLabs: Detection: 12%
Source: C:\Users\user\Desktop\Bank Details.exeFile read: C:\Users\user\Desktop\Bank Details.exeJump to behavior
Source: Bank Details.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Bank Details.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Bank Details.exe "C:\Users\user\Desktop\Bank Details.exe"
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmpEA4C.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Users\user\Desktop\Bank Details.exe C:\Users\user\Desktop\Bank Details.exe
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmp5C9D.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmpEA4C.tmpJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Users\user\Desktop\Bank Details.exe C:\Users\user\Desktop\Bank Details.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmp5C9D.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeFile created: C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEA4C.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@18/19@15/1
Source: C:\Users\user\Desktop\Bank Details.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: 8.0.Bank Details.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 8.0.Bank Details.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 8.0.Bank Details.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 8.0.Bank Details.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: C:\Users\user\Desktop\Bank Details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6580:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1724:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5848:120:WilError_01
Source: C:\Users\user\Desktop\Bank Details.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{55e3c1f3-bf1e-4980-afea-8df9e1395f07}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6680:120:WilError_01
Source: C:\Users\user\Desktop\Bank Details.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: Bank Details.exe, 00000000.00000003.231936223.00000000053DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0s.slnt
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\Bank Details.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Bank Details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Bank Details.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Bank Details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: k,C:\Windows\System.pdb source: Bank Details.exe, 00000008.00000002.502757810.000000000674C000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\rzthYHtLly\src\obj\Debug\CreateValueCallb.pdb source: dhcpmon.exe, Bank Details.exe, nOcstjdWFAT.exe.0.dr, dhcpmon.exe.8.dr
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Bank Details.exe, 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: Bank Details.exe, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: nOcstjdWFAT.exe.0.dr, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 0.2.Bank Details.exe.c0000.0.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 0.0.Bank Details.exe.c0000.0.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: dhcpmon.exe.8.dr, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.5.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.0.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.2.Bank Details.exe.530000.1.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.1.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.3.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.13.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.2.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.9.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.11.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.530000.7.unpack, OptionsDialog.cs.Net Code: iiiii System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 8.0.Bank Details.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: Bank Details.exe, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: nOcstjdWFAT.exe.0.dr, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 0.2.Bank Details.exe.c0000.0.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 0.0.Bank Details.exe.c0000.0.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: dhcpmon.exe.8.dr, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.5.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.0.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.2.Bank Details.exe.530000.1.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.1.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.3.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.13.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.2.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.9.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.11.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: 8.0.Bank Details.exe.530000.7.unpack, OptionsDialog.cs.Net Code: LateBinding.LateCall(V_0, null, "Invoke", new object[] { null, new object[] { "436F6E63757272656E744578636C75736976655461736B536368656475", "713137324D5035", "PagedOptionsDialog" } }, null, null)
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_000C9E6E pushad ; ret 0_2_000C9E84
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_00A97DC8 push 8C024627h; iretd 0_2_00A97DCD
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_00A97E14 push eax; iretd 0_2_00A97E15
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_06E73E0F push esp; ret 0_2_06E73E10
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_06E75D51 push es; ret 0_2_06E75D7C
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 0_2_07043DBD pushfd ; ret 0_2_07043DBE
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_00539E6E pushad ; ret 8_2_00539E84
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_05D8C7C2 push 8B000005h; retf 8_2_05D8C7C7
Source: C:\Users\user\Desktop\Bank Details.exeCode function: 8_2_082216C9 push 8B506449h; retf 8_2_082216CF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_00A79E6E pushad ; ret 20_2_00A79E84
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_02D17DC1 push 8C053227h; iretd 20_2_02D17DCD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_07373E0F push esp; ret 20_2_07373E10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_07543DBD pushfd ; ret 20_2_07543DBE
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_00969E6E pushad ; ret 27_2_00969E84
Source: initial sampleStatic PE information: section name: .text entropy: 7.94302903264
Source: initial sampleStatic PE information: section name: .text entropy: 7.94302903264
Source: initial sampleStatic PE information: section name: .text entropy: 7.94302903264
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 8.2.Bank Details.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 8.0.Bank Details.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 8.0.Bank Details.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 8.0.Bank Details.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 8.0.Bank Details.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 8.0.Bank Details.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 8.0.Bank Details.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: C:\Users\user\Desktop\Bank Details.exeFile created: C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to dropped file
Source: C:\Users\user\Desktop\Bank Details.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmpEA4C.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\Bank Details.exeFile opened: C:\Users\user\Desktop\Bank Details.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: 00000014.00000002.343046224.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.280585839.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.280695946.0000000002545000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTR
Source: Bank Details.exe, 00000000.00000002.280585839.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000002.280695946.0000000002545000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.343046224.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: Bank Details.exe, 00000000.00000002.280585839.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000002.280695946.0000000002545000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.343046224.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
Source: C:\Users\user\Desktop\Bank Details.exe TID: 2096Thread sleep time: -45733s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exe TID: 2236Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4948Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exe TID: 5816Thread sleep time: -22136092888451448s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6404Thread sleep time: -45733s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6420Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6776Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6860Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_052D7E78 rdtsc 27_2_052D7E78
Source: C:\Users\user\Desktop\Bank Details.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6889Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1807Jump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeWindow / User API: threadDelayed 5353Jump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeWindow / User API: threadDelayed 4087Jump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeWindow / User API: foregroundWindowGot 629Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7279
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1114
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeThread delayed: delay time: 45733Jump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 45733Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: Bank Details.exe, 00000008.00000002.495474944.0000000000BE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_052D7E78 rdtsc 27_2_052D7E78
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\Bank Details.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Bank Details.exeMemory written: C:\Users\user\Desktop\Bank Details.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmpEA4C.tmpJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeProcess created: C:\Users\user\Desktop\Bank Details.exe C:\Users\user\Desktop\Bank Details.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmp5C9D.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: Bank Details.exe, 00000008.00000002.497267507.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.504014017.00000000084AE000.00000004.00000010.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.497254169.0000000002B97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: Bank Details.exe, 00000008.00000002.501909180.0000000005A3B000.00000004.00000010.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.502007458.0000000005C6C000.00000004.00000010.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.504146352.000000000886E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: Bank Details.exe, 00000008.00000002.504109351.000000000872B000.00000004.00000010.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.497219418.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager8
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$YkX
Source: Bank Details.exe, 00000008.00000002.497267507.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.497044278.0000000002A4F000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.497677103.0000000002E98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: Bank Details.exe, 00000008.00000002.497219418.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHaYk
Source: Bank Details.exe, 00000008.00000002.502231774.000000000614A000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager (
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Users\user\Desktop\Bank Details.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Users\user\Desktop\Bank Details.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\Bank Details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Bank Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Bank Details.exe, 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Bank Details.exe, 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000003.430786991.0000000000C93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Bank Details.exe, 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Bank Details.exe, 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Bank Details.exe, 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Bank Details.exe, 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Bank Details.exe, 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: dhcpmon.exe, 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.413ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3e0455d.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfb0fe.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.3dfff34.5.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394b0fe.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46bd622.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c7b91.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e0000.34.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.395455d.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47c3568.23.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.47be732.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.373ba10.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.52e4629.33.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Bank Details.exe.36eb010.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.394ff34.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.483d4d1.28.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.0.Bank Details.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.4838ea8.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.469cdc1.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 20.2.dhcpmon.exe.40b67f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.Bank Details.exe.46a8ff5.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 1900, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Bank Details.exe PID: 3560, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6400, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6784, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
11
Input Capture
1
Query Registry
Remote Services11
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scheduled Task/Job
Boot or Logon Initialization Scripts1
Scheduled Task/Job
11
Disable or Modify Tools
LSASS Memory221
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items3
Obfuscated Files or Information
DCSync12
System Information Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job23
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 624809 Sample: Bank Details.exe Startdate: 12/05/2022 Architecture: WINDOWS Score: 100 52 Snort IDS alert for network traffic 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 16 other signatures 2->58 7 Bank Details.exe 7 2->7         started        11 dhcpmon.exe 5 2->11         started        process3 file4 36 C:\Users\user\AppData\...\nOcstjdWFAT.exe, PE32 7->36 dropped 38 C:\Users\...\nOcstjdWFAT.exe:Zone.Identifier, ASCII 7->38 dropped 40 C:\Users\user\AppData\Local\...\tmpEA4C.tmp, XML 7->40 dropped 42 C:\Users\user\...\Bank Details.exe.log, ASCII 7->42 dropped 60 Adds a directory exclusion to Windows Defender 7->60 62 Injects a PE file into a foreign processes 7->62 13 Bank Details.exe 1 12 7->13         started        18 powershell.exe 25 7->18         started        20 schtasks.exe 1 7->20         started        22 powershell.exe 11->22         started        24 schtasks.exe 11->24         started        26 dhcpmon.exe 11->26         started        signatures5 process6 dnsIp7 50 chima2022.ddns.net 194.31.98.116, 2022, 49758, 49761 BURSABILTR Netherlands 13->50 44 C:\Program Files (x86)\...\dhcpmon.exe, PE32 13->44 dropped 46 C:\Users\user\AppData\Roaming\...\run.dat, data 13->46 dropped 48 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 13->48 dropped 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->64 28 conhost.exe 18->28         started        30 conhost.exe 20->30         started        32 conhost.exe 22->32         started        34 conhost.exe 24->34         started        file8 signatures9 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Bank Details.exe12%ReversingLabsByteCode-MSIL.Trojan.Generic
Bank Details.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe12%ReversingLabsByteCode-MSIL.Trojan.Generic
C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe12%ReversingLabsByteCode-MSIL.Trojan.Generic
SourceDetectionScannerLabelLinkDownload
27.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
8.2.Bank Details.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
8.0.Bank Details.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
8.0.Bank Details.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
27.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
27.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
27.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
8.0.Bank Details.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
8.2.Bank Details.exe.52e0000.34.unpack100%AviraTR/NanoCore.fadteDownload File
27.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
27.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
8.0.Bank Details.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
8.0.Bank Details.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
No Antivirus matches
SourceDetectionScannerLabelLink
0%Avira URL Cloudsafe
http://www.galapagosdesign.com/0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.fonts.comcxe0%Avira URL Cloudsafe
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
chima2022.ddns.net0%Avira URL Cloudsafe
http://www.fontbureau.com(V~0%Avira URL Cloudsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.ascendercorp.com/typedesigners.html;0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
chima2022.ddns.net
194.31.98.116
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    true
    • Avira URL Cloud: safe
    low
    chima2022.ddns.nettrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.comBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designersGBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.galapagosdesign.com/Bank Details.exe, 00000000.00000003.239877331.00000000053E8000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.239900469.00000000053E8000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers/?Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fonts.comcxeBank Details.exe, 00000000.00000003.229338584.00000000053BB000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.tiro.comBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.goodfont.co.krBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://google.comBank Details.exe, 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, Bank Details.exe, 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com(V~Bank Details.exe, 00000000.00000002.284449354.00000000053A0000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.279101275.00000000053A0000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.carterandcone.comlBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cTheBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.239968119.00000000053B8000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.ascendercorp.com/typedesigners.html;Bank Details.exe, 00000000.00000003.233452339.00000000053B9000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000003.233385137.00000000053B8000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-user.htmlBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleaseBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers8Bank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comBank Details.exe, 00000000.00000003.229367383.00000000053DE000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBank Details.exe, 00000000.00000002.280585839.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, Bank Details.exe, 00000000.00000002.280695946.0000000002545000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.343046224.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sakkal.comBank Details.exe, 00000000.00000002.284773874.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            194.31.98.116
                            chima2022.ddns.netNetherlands
                            60721BURSABILTRfalse
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:624809
                            Start date and time: 12/05/202204:17:072022-05-12 04:17:07 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 13m 55s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:Bank Details.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:37
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@18/19@15/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 0.2% (good quality ratio 0.2%)
                            • Quality average: 63.7%
                            • Quality standard deviation: 36.1%
                            HCA Information:
                            • Successful, ratio: 93%
                            • Number of executed functions: 94
                            • Number of non-executed functions: 8
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Adjust boot time
                            • Enable AMSI
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtDeviceIoControlFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            04:18:16API Interceptor814x Sleep call for process: Bank Details.exe modified
                            04:18:26API Interceptor80x Sleep call for process: powershell.exe modified
                            04:18:34AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            04:18:46API Interceptor1x Sleep call for process: dhcpmon.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):573440
                            Entropy (8bit):7.798214289782311
                            Encrypted:false
                            SSDEEP:12288:M4GvSfRMVmvlcY3bUP01EZ46IeXuLJxK1AXmq0sSNIiEq402Kbe:M78N3/EZ46I7JxK+qjU0n
                            MD5:E62E3496DEB3EE2C512CA61CF2642A0D
                            SHA1:2B7942225B4D43EC944622E2B80D0D18C5376F70
                            SHA-256:A9EE1FBEE3B6BD1C9C449774B8ED2F02FB89BDE7CBF72B2E348C61240971238E
                            SHA-512:E133E01095011D17DE5373B2FE486F49CA0F75B26FD23BC246F3AA94D8C2A8F7925835124EC1104D038EEBB24ACE9941F27A05886079F1892C88E78333E4B7CA
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 12%
                            Reputation:unknown
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4c|b..............0..`...@.......s... ........@.. ... ....................... ........@..................................s..O...................................\r............................................... ............... ..H............text....S... ...`... .............. ..`.rsrc............ ..................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Reputation:unknown
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):1308
                            Entropy (8bit):5.345811588615766
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4FsXE8:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHJ
                            MD5:EA78C102145ED608EF0E407B978AF339
                            SHA1:66C9179ED9675B9271A97AB1FC878077E09AB731
                            SHA-256:8BF01E0C445BD07C0B4EDC7199B7E17DAF1CA55CA52D4A6EAC4EF211C2B1A73E
                            SHA-512:8C04139A1FC3C3BDACB680EC443615A43EB18E73B5A0CFCA644CB4A5E71746B275B3E238DD1A5A205405313E457BB75F9BBB93277C67AFA5D78DCFA30E5DA02B
                            Malicious:true
                            Reputation:unknown
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1308
                            Entropy (8bit):5.345811588615766
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4FsXE8:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHJ
                            MD5:EA78C102145ED608EF0E407B978AF339
                            SHA1:66C9179ED9675B9271A97AB1FC878077E09AB731
                            SHA-256:8BF01E0C445BD07C0B4EDC7199B7E17DAF1CA55CA52D4A6EAC4EF211C2B1A73E
                            SHA-512:8C04139A1FC3C3BDACB680EC443615A43EB18E73B5A0CFCA644CB4A5E71746B275B3E238DD1A5A205405313E457BB75F9BBB93277C67AFA5D78DCFA30E5DA02B
                            Malicious:false
                            Reputation:unknown
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):22280
                            Entropy (8bit):5.602104023194985
                            Encrypted:false
                            SSDEEP:384:gtCDLq0Ra1MzD68TQBG0lRcS0n4jultIaPpaeQ99gbpbcxyT1MaDZlbAV75slqhP:SWD6wJrT4Clt1Bat8hZC6fw2tVY
                            MD5:C7C33EB8763FDC52CC134C147FC22367
                            SHA1:F09E2F251F926894F6821FC334D71DE7407D6348
                            SHA-256:94C72D6CD39BE72210B304CC182819D44B9EBBBAA3F2F3ADCCC0F222BB3DCC44
                            SHA-512:6FF98BB2BC846B0C1EE91DE810E78902C8B3B58F21BDA52285853A597E3964F9C0D87DAFF3BEB872C44E65A6796EC0C44E4D9291BA3D6CC598E749F6FB7E6BBF
                            Malicious:false
                            Reputation:unknown
                            Preview:@...e...........y.........Z.:.1.1...S.u...r..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:unknown
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:unknown
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:unknown
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:unknown
                            Preview:1
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1598
                            Entropy (8bit):5.136648748218081
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaDb+xvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTpv
                            MD5:67036E15EF31876136F320B5FCECE52C
                            SHA1:D301B3A0B0FDA38115B2A028A3B0F0518E549775
                            SHA-256:124C5059D2D3FAB1B1E4C49E41CB1820217495F98074A6E563513512F15A8908
                            SHA-512:A03F8FEFF1A19135B78F4612106A6B044552EDF5784E78D3B2C6485CBB2D0F328417C1BB349F35FA327C69981AC99681E0CF840DB49D9A9E1A2B28F779A5B7AF
                            Malicious:false
                            Reputation:unknown
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1598
                            Entropy (8bit):5.136648748218081
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaDb+xvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTpv
                            MD5:67036E15EF31876136F320B5FCECE52C
                            SHA1:D301B3A0B0FDA38115B2A028A3B0F0518E549775
                            SHA-256:124C5059D2D3FAB1B1E4C49E41CB1820217495F98074A6E563513512F15A8908
                            SHA-512:A03F8FEFF1A19135B78F4612106A6B044552EDF5784E78D3B2C6485CBB2D0F328417C1BB349F35FA327C69981AC99681E0CF840DB49D9A9E1A2B28F779A5B7AF
                            Malicious:true
                            Reputation:unknown
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):232
                            Entropy (8bit):7.024371743172393
                            Encrypted:false
                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                            MD5:32D0AAE13696FF7F8AF33B2D22451028
                            SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                            SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                            SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                            Malicious:false
                            Reputation:unknown
                            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:ZN:/
                            MD5:A8DD010F1502D96AF41BB635E99D3521
                            SHA1:067B3897AEEB9F203CF93C9F67D5B953091796F0
                            SHA-256:B23B0F8F7174FFDDF023626CBC2F110A2A75FFD41FF30502C0FA9F1C44A0424E
                            SHA-512:C562AD89951160151F6D2E97A4FF9A3B4976F5CC1455DB7C553EF32BF2CD951D9428FF649E8F962148F49E5B5CCFCB8A3B11187FD09379AD170A7BD4D7F9C1CC
                            Malicious:true
                            Reputation:unknown
                            Preview:.`...3.H
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:data
                            Category:modified
                            Size (bytes):40
                            Entropy (8bit):5.153055907333276
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                            MD5:4E5E92E2369688041CC82EF9650EDED2
                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                            Malicious:false
                            Reputation:unknown
                            Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):327432
                            Entropy (8bit):7.99938831605763
                            Encrypted:true
                            SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                            MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                            SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                            SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                            SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                            Malicious:false
                            Reputation:unknown
                            Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):573440
                            Entropy (8bit):7.798214289782311
                            Encrypted:false
                            SSDEEP:12288:M4GvSfRMVmvlcY3bUP01EZ46IeXuLJxK1AXmq0sSNIiEq402Kbe:M78N3/EZ46I7JxK+qjU0n
                            MD5:E62E3496DEB3EE2C512CA61CF2642A0D
                            SHA1:2B7942225B4D43EC944622E2B80D0D18C5376F70
                            SHA-256:A9EE1FBEE3B6BD1C9C449774B8ED2F02FB89BDE7CBF72B2E348C61240971238E
                            SHA-512:E133E01095011D17DE5373B2FE486F49CA0F75B26FD23BC246F3AA94D8C2A8F7925835124EC1104D038EEBB24ACE9941F27A05886079F1892C88E78333E4B7CA
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 12%
                            Reputation:unknown
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4c|b..............0..`...@.......s... ........@.. ... ....................... ........@..................................s..O...................................\r............................................... ............... ..H............text....S... ...`... .............. ..`.rsrc............ ..................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Bank Details.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Reputation:unknown
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5793
                            Entropy (8bit):5.388896054676983
                            Encrypted:false
                            SSDEEP:96:BZ8jFNzqDo1ZDZUtjFNzqDo1Z/0GsjZzjFNzqDo1ZzV88KZ6:1m
                            MD5:8228C39283F5BEFF7E37C8691849664F
                            SHA1:B877538AEA027D05F3977764068EB6F9A94AB773
                            SHA-256:87F73FDE539243A5C4369A11335E28624DE59136044BBFB1B0F6BE80AA1890C9
                            SHA-512:47EFC4ECE3D2B0086159502948DD93036B9C821DBADFEEDEFE5C412B69C71352962516EB8EB8BFF511F2516E45F29C33AA73759C48682316FFD688082289964F
                            Malicious:false
                            Reputation:unknown
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220512041852..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 124406 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe..Process ID: 6572..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220512041852..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe..**********************..Windows PowerShell transcript start..Start time: 20220512042240..Username: computer\user..RunAs User: computer\jo
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5790
                            Entropy (8bit):5.386889511878751
                            Encrypted:false
                            SSDEEP:96:BZtjFN8qDo1ZWZcjFN8qDo1Zw0GsjZ6gjFN8qDo1ZwKV88QZv:0CF
                            MD5:CA470292FE80BFA3FC81C85E7969D89D
                            SHA1:9D3662B9D81069FA5CD9F4841BECFDECB5667C2D
                            SHA-256:0F1CB65C83C1FC586F111BFB3FBD0229FDBC8400270CCE23D8F8D44E52EC6923
                            SHA-512:304F9F95375EAA817C412421098D216641E634DBE986A26B381B757219555B26580E83B494C1757F90CED499750663F39DF6D2441AB23B91652F75B5F4B8F6DA
                            Malicious:false
                            Reputation:unknown
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220512041826..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 124406 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe..Process ID: 580..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220512041826..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe..**********************..Windows PowerShell transcript start..Start time: 20220512042149..Username: computer\user..RunAs User: computer\jon
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.798214289782311
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:Bank Details.exe
                            File size:573440
                            MD5:e62e3496deb3ee2c512ca61cf2642a0d
                            SHA1:2b7942225b4d43ec944622e2b80d0d18c5376f70
                            SHA256:a9ee1fbee3b6bd1c9c449774b8ed2f02fb89bde7cbf72b2e348c61240971238e
                            SHA512:e133e01095011d17de5373b2fe486f49ca0f75b26fd23bc246f3aa94d8c2a8f7925835124ec1104d038eebb24ace9941f27a05886079f1892c88e78333e4b7ca
                            SSDEEP:12288:M4GvSfRMVmvlcY3bUP01EZ46IeXuLJxK1AXmq0sSNIiEq402Kbe:M78N3/EZ46I7JxK+qjU0n
                            TLSH:C1C4225407A52736E86C0BB5EE8229CD17B5AD835D25EB0FCCE4F1C949B874A42E132F
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4c|b..............0..`...@.......s... ........@.. ... ....................... ........@................................
                            Icon Hash:00828e8e8686b000
                            Entrypoint:0x4873e6
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x627C6334 [Thu May 12 01:30:28 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:v4.0.30319
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x873940x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x5f4.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x8725c0x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x853ec0x86000False0.952762432952data7.94302903264IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rsrc0x880000x5f40x2000False0.084716796875data1.0972336531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x8a0000xc0x2000False0.0050048828125data0.00881485270734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0x880900x364data
                            RT_MANIFEST0x884040x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            DescriptionData
                            Translation0x0000 0x04b0
                            LegalCopyrightCopyright 2013
                            Assembly Version0.0.1.0
                            InternalNameCreateValueCallb.exe
                            FileVersion0.0.1.0
                            CompanyName
                            LegalTrademarks
                            Comments
                            ProductNamePagedOptionsDialog
                            ProductVersion0.0.1.0
                            FileDescriptionPagedOptionsDialog
                            OriginalFilenameCreateValueCallb.exe
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            192.168.2.4194.31.98.1164983020222816766 05/12/22-04:19:36.011525TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498302022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164977320222816766 05/12/22-04:19:20.018597TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497732022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164986320222816766 05/12/22-04:20:10.853853TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498632022192.168.2.4194.31.98.116
                            194.31.98.116192.168.2.42022497582841753 05/12/22-04:18:37.050338TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)202249758194.31.98.116192.168.2.4
                            192.168.2.4194.31.98.1164983320222816766 05/12/22-04:19:42.105532TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498332022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164977120222025019 05/12/22-04:19:11.899573TCP2025019ET TROJAN Possible NanoCore C2 60B497712022192.168.2.4194.31.98.116
                            194.31.98.116192.168.2.42022497972841753 05/12/22-04:19:25.210300TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)202249797194.31.98.116192.168.2.4
                            192.168.2.4194.31.98.1164976920222025019 05/12/22-04:18:58.075804TCP2025019ET TROJAN Possible NanoCore C2 60B497692022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164976920222816766 05/12/22-04:19:00.725683TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497692022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164983320222025019 05/12/22-04:19:41.132097TCP2025019ET TROJAN Possible NanoCore C2 60B498332022192.168.2.4194.31.98.116
                            194.31.98.116192.168.2.42022498332841753 05/12/22-04:19:46.171498TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)202249833194.31.98.116192.168.2.4
                            192.168.2.4194.31.98.1164986320222025019 05/12/22-04:20:10.583511TCP2025019ET TROJAN Possible NanoCore C2 60B498632022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164977320222816718 05/12/22-04:19:19.399645TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497732022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164977320222025019 05/12/22-04:19:18.977182TCP2025019ET TROJAN Possible NanoCore C2 60B497732022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164983020222025019 05/12/22-04:19:35.133701TCP2025019ET TROJAN Possible NanoCore C2 60B498302022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164975820222816766 05/12/22-04:18:37.020536TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497582022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164976120222816766 05/12/22-04:18:44.803258TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497612022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164977120222816766 05/12/22-04:19:12.897247TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497712022192.168.2.4194.31.98.116
                            194.31.98.116192.168.2.42022498632810451 05/12/22-04:20:20.632430TCP2810451ETPRO TROJAN NanoCore RAT Keepalive Response 3202249863194.31.98.116192.168.2.4
                            194.31.98.116192.168.2.42022498632841753 05/12/22-04:20:20.632430TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)202249863194.31.98.116192.168.2.4
                            192.168.2.4194.31.98.1164983420222025019 05/12/22-04:19:47.368674TCP2025019ET TROJAN Possible NanoCore C2 60B498342022192.168.2.4194.31.98.116
                            194.31.98.116192.168.2.42022498162841753 05/12/22-04:19:30.172998TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)202249816194.31.98.116192.168.2.4
                            192.168.2.4194.31.98.1164985920222816766 05/12/22-04:20:05.810359TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498592022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164985420222025019 05/12/22-04:19:56.611527TCP2025019ET TROJAN Possible NanoCore C2 60B498542022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164979720222025019 05/12/22-04:19:25.160988TCP2025019ET TROJAN Possible NanoCore C2 60B497972022192.168.2.4194.31.98.116
                            194.31.98.116192.168.2.42022498592810290 05/12/22-04:20:04.821759TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1202249859194.31.98.116192.168.2.4
                            192.168.2.4194.31.98.1164976120222025019 05/12/22-04:18:43.016236TCP2025019ET TROJAN Possible NanoCore C2 60B497612022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164976420222025019 05/12/22-04:18:49.975269TCP2025019ET TROJAN Possible NanoCore C2 60B497642022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164977020222816766 05/12/22-04:19:06.711904TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497702022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164975820222025019 05/12/22-04:18:36.685534TCP2025019ET TROJAN Possible NanoCore C2 60B497582022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164983420222816766 05/12/22-04:19:48.215646TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498342022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164981620222025019 05/12/22-04:19:30.131962TCP2025019ET TROJAN Possible NanoCore C2 60B498162022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164985920222025019 05/12/22-04:20:03.455105TCP2025019ET TROJAN Possible NanoCore C2 60B498592022192.168.2.4194.31.98.116
                            192.168.2.4194.31.98.1164977020222025019 05/12/22-04:19:05.824499TCP2025019ET TROJAN Possible NanoCore C2 60B497702022192.168.2.4194.31.98.116
                            194.31.98.116192.168.2.42022497642841753 05/12/22-04:18:50.082261TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)202249764194.31.98.116192.168.2.4
                            192.168.2.4194.31.98.1164985420222816766 05/12/22-04:19:58.208455TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498542022192.168.2.4194.31.98.116
                            TimestampSource PortDest PortSource IPDest IP
                            May 12, 2022 04:18:36.577502012 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:36.608098030 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:36.608289957 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:36.685534000 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:36.742813110 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:36.758797884 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.020535946 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.050338030 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.050493002 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.109476089 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.109595060 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.383436918 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.535440922 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.583087921 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.615088940 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.615145922 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.615257025 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.646132946 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.646193027 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.646265984 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.646342039 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.677642107 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.677719116 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.677763939 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.677794933 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.677799940 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.677898884 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.709156036 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.709216118 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.709269047 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.709270954 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.709327936 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.709386110 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.709393024 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.709465027 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.741178989 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.741233110 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.741287947 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.741341114 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.741359949 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.741394997 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.741399050 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.741447926 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.741612911 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.773022890 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.773081064 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.773134947 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.773190022 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.773219109 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.773242950 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.773256063 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.773300886 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.773363113 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.804007053 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.804075956 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.804135084 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.804187059 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.804240942 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.804292917 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.804326057 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.804347038 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.804399014 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.804405928 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.835463047 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.835540056 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.835596085 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.835597038 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.835654974 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.835658073 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.835709095 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.835762978 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.835814953 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.835824013 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.835870981 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.835870981 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.867137909 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.867208958 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.867346048 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.867403030 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.899913073 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.901063919 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.931911945 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.932055950 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.962966919 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.963032007 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.963084936 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.963094950 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.963159084 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.963166952 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.995317936 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.995388985 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.995441914 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.995498896 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:37.995538950 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.995604038 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.995611906 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:37.995618105 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:38.021573067 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:38.026906013 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:38.028120041 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:38.028542042 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:38.028587103 CEST202249758194.31.98.116192.168.2.4
                            May 12, 2022 04:18:38.028656960 CEST497582022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:42.984404087 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.015599966 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.015753031 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.016236067 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.075470924 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.075809956 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.107569933 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.224298000 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.375436068 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.455841064 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.513521910 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.513562918 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.513587952 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.513612986 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.513636112 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.513686895 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.543772936 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.543833017 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.543874979 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.543909073 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.543914080 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.543953896 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.543967962 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.543993950 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.544034004 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.544042110 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.544075012 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.544121027 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575599909 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575668097 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575709105 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575750113 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575773954 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575788975 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575824976 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575831890 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575831890 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575859070 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575874090 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575890064 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575912952 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575930119 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575953960 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.575967073 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.575994968 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.576009035 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.576052904 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.605896950 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.605976105 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606028080 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606077909 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606106043 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606125116 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606143951 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606149912 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606154919 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606188059 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606236935 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606252909 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606256962 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606297970 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606339931 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606353998 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.606368065 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.606430054 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.637216091 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.637275934 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.637306929 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.637319088 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.637351990 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.637360096 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.637377024 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.637409925 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.637432098 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.637475967 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.834131956 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:43.920310974 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.969933987 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:43.970082045 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.003067970 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.003122091 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.003161907 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.003201962 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.003762960 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.036618948 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.036673069 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.036710024 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.036741018 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.067668915 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.067740917 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.067770958 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.067797899 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.098736048 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.098803043 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.098860979 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.098861933 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.098911047 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.098916054 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.129611015 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.129678965 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.129734993 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.129759073 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.129796982 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.129803896 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.160969973 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.161047935 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.161084890 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.161103964 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.161215067 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.191973925 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.192058086 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.223131895 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.223351955 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.254146099 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.254236937 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.285567045 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.285679102 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.316817045 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.316967964 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.347078085 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.347207069 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.379426003 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.379652023 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.410733938 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.410896063 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.421674967 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.421819925 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.456835985 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.456904888 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.456983089 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.459644079 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.487341881 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.487473011 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.518160105 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.518227100 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.518346071 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.549568892 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.549623013 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.549705982 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.549761057 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.580881119 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.580930948 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.581020117 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.582791090 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.610852957 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.610903025 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.610950947 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.610971928 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.610991955 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.611015081 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.611022949 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.611035109 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.611047983 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.611093044 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.611108065 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.612512112 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.612617016 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.641832113 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.641860008 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.641927004 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.643376112 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.643407106 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.643465042 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.672080040 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.672138929 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.672246933 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.673648119 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.673732042 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.673769951 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.673840046 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.702913046 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.702943087 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.703023911 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.704536915 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.704566002 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.704602003 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.704622030 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.704648972 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.733923912 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.733952045 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.734026909 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.735555887 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.735579014 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.735704899 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.735754013 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.781328917 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.781492949 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.781498909 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.781601906 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.803257942 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.812616110 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.812647104 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.812664986 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.812711954 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.812747002 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.842628002 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.842679977 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.842710018 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.842843056 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.873833895 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.873980999 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.873989105 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.874001026 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.874063969 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.904820919 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.904894114 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.904933929 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.904973984 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.905015945 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.905057907 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.935497046 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.935564041 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.935628891 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.935678959 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.935695887 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.935736895 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.935739040 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.965852022 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.965912104 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.965965033 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.966001034 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.966018915 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.966032028 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.966078043 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.966146946 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.995950937 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.996005058 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.996100903 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.996119976 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.996154070 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.996211052 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.996237993 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:44.996267080 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.996320963 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:44.996321917 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.027122021 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.027165890 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.027189970 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.027213097 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.027214050 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.027235985 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.027246952 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.027261019 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.027280092 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.027285099 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.027326107 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.056982040 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057029009 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057068110 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057102919 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057106018 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.057141066 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057157040 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.057178974 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057224035 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057231903 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.057248116 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057275057 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.057300091 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.087866068 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.087929010 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.087975979 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.088009119 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.088032007 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.088047028 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.088131905 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.088185072 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.088201046 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.088238001 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.088291883 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.088294983 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118439913 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118500948 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118567944 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118576050 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.118617058 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118652105 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.118670940 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118705034 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.118726969 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118758917 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.118778944 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.118791103 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.118843079 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.149627924 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.149693012 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.149751902 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.149785995 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.149840117 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.151736975 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.179493904 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.179541111 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.179677010 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.179730892 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.181761980 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.181843996 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.209975958 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.210032940 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.210099936 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.210150957 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.210164070 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.210222006 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.210231066 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.212271929 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.212842941 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.240895987 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.240976095 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.241031885 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.241072893 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.241121054 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.241127014 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.243369102 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.243700027 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.271481037 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.271564007 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.271642923 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.271661997 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.271703005 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.272622108 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.273776054 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.273860931 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.302592039 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.302622080 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.302786112 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.304342985 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.304375887 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.304421902 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.304471016 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.332983017 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.333101034 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.333906889 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.333935022 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.333982944 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.334002972 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.362761021 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.362905025 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.363217115 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.363239050 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.363287926 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.363341093 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.394047022 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.394083977 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.394117117 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.394150019 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.394186020 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.394191027 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.425905943 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.425940037 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.425956964 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.426078081 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.451452971 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.453768969 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.483746052 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.483767986 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.483786106 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.483804941 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.483823061 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.483871937 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.483925104 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.514054060 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.514097929 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.514133930 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.514170885 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.514205933 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.514225006 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.514272928 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.544882059 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.544936895 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.544959068 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.544982910 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.545006990 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.545028925 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.545037985 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.545103073 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.545110941 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.576001883 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.576073885 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.576117039 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.576154947 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.576193094 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.576196909 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.576232910 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.576246023 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.576276064 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.576323986 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.607137918 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.607203007 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.607243061 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.607273102 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.607281923 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.607302904 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.607322931 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.607446909 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.638222933 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.638289928 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.638334036 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.638375044 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.638391018 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.638417006 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.638428926 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.638436079 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.638442039 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.638457060 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.638469934 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.638499022 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.638564110 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.669363976 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.669429064 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.669466972 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.669501066 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.669524908 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.669534922 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.669567108 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.669574022 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.669575930 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.669579983 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.669615984 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.669634104 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.669718981 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.703066111 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.703274965 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.703318119 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.703357935 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.703377008 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.703428030 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.734452009 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.734519005 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.734558105 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.734596968 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.734610081 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.734638929 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.734699011 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.766880989 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.766932011 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.766973019 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.767002106 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.767010927 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.767051935 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.767061949 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.767102003 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.767107010 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.797792912 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.797854900 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.797899008 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.797940969 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.797950983 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.797977924 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.798001051 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.798051119 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.798057079 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.803755999 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.830887079 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.830929041 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.830952883 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.830981016 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.831012964 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.831012964 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.831042051 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.831054926 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.831064939 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.831074953 CEST202249761194.31.98.116192.168.2.4
                            May 12, 2022 04:18:45.831089020 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.831098080 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:45.831125021 CEST497612022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:49.943886042 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:49.974653006 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:49.974798918 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:49.975269079 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.051728010 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.051987886 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.082261086 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.224994898 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.259872913 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.386815071 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.732467890 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.834656954 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.853559017 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.868807077 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.868870020 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.868911982 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.868953943 CEST202249764194.31.98.116192.168.2.4
                            May 12, 2022 04:18:50.869020939 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.869070053 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:50.869076014 CEST497642022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:54.993181944 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:58.006937027 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:58.037703991 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:58.037795067 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:58.075803995 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:58.146955013 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:58.147037029 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:58.223309040 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:58.224664927 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:58.274307013 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:58.397618055 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:58.864379883 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.023853064 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.032772064 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.032814980 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.032844067 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.032890081 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.032960892 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.032994032 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.063349962 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.063393116 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.063445091 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.063476086 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.063504934 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.063534975 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.063565969 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.063659906 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.063718081 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.070223093 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094327927 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094372988 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094403982 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094434977 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094465017 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094486952 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094511986 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094513893 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094546080 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094569921 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094575882 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094582081 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094608068 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094639063 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.094654083 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094661951 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094666958 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.094969988 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.100785017 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.100828886 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.100878954 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.100908995 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.100974083 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.101109028 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.126231909 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.126276970 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.126328945 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.126358032 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.126398087 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.126427889 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.126508951 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.126545906 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.126552105 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.126557112 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.131956100 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.131998062 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.134918928 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.157120943 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.157923937 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.157959938 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.158051014 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.158082008 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.158124924 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.158179998 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.158210039 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.158216000 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.164813042 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.164846897 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.165076971 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.187946081 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.188020945 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.188052893 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.188083887 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.188122034 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.188158989 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.188170910 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.188190937 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.188196898 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.188226938 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.194569111 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.194633961 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.194746971 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.218724012 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.218775988 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.218807936 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.218847036 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.218878984 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.218909025 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.218951941 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.219016075 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.219027042 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.225275040 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.225322008 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.225419044 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.225534916 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.225558043 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.249680996 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.249723911 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.249756098 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.249785900 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.249816895 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.249845982 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.249876976 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.249919891 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.249974012 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.249994993 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.255645037 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.255681992 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.255723953 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.255754948 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.255836010 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.255861044 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.281142950 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.281191111 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.281265020 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.281295061 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.281419992 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.281459093 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.286396027 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.286459923 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.286490917 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.286521912 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.286540985 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.286552906 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.286554098 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.286586046 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.286596060 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.286621094 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.312153101 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.312414885 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.317603111 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.317643881 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.317693949 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.317732096 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.317773104 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.317796946 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.317806005 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.317840099 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.317847013 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.317847967 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.317854881 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.317913055 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.317929983 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.318069935 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.342999935 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.349148035 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.349333048 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.349375010 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.349467993 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.351706982 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.379020929 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.379070044 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.379322052 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.380783081 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.380817890 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.380861998 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.380892992 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.380979061 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.381016970 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.410816908 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.411241055 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.411541939 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.411578894 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.411638975 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.411674023 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.412506104 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.446708918 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.446763992 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.446873903 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.447065115 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.447103024 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.477292061 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.477323055 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.477366924 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.479121923 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.509098053 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.517057896 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.547024965 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.547313929 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.549035072 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.552975893 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.577508926 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.577579975 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.577729940 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.577780008 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.610882998 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.610960960 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.611110926 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.640932083 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.641017914 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.678028107 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.678262949 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.707672119 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.707762957 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.737981081 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.738182068 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.769340992 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.769476891 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.769543886 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.769613028 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.769671917 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.799283028 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.799354076 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.799407959 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.799408913 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.799469948 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.834585905 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.834666014 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.834718943 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.834743023 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.834786892 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.834845066 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.867777109 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.867840052 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.867877960 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.867917061 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.867955923 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.867990971 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.868043900 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.899740934 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.899801016 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.899833918 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.899871111 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.899912119 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.899991989 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.900053024 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.900062084 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.930908918 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.930953026 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.930980921 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.931006908 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.931034088 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.931062937 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.931088924 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.931090117 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.931134939 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.931142092 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.963129997 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.963179111 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.963202000 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.963231087 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.963248014 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.963263988 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.963287115 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.963376045 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.963428974 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.993916035 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.993959904 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.993985891 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.994009018 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.994031906 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.994055033 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.994059086 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.994083881 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.994090080 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.994108915 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.994129896 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:18:59.994133949 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:18:59.994194031 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.052983046 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053045034 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053086042 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053168058 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053212881 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053211927 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.053245068 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.053253889 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053272963 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.053297043 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053333998 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.053354025 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.085577011 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085634947 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085678101 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085716963 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085737944 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.085756063 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085796118 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085798025 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.085812092 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.085834980 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085874081 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085886002 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.085912943 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.085961103 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.116559029 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116602898 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116617918 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116633892 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116652012 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116668940 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116686106 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116691113 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.116703033 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116722107 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116734982 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.116739988 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116756916 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.116769075 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.116820097 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.147068977 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147125006 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147161961 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147197962 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147233009 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147248983 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.147269964 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147294998 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.147303104 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.147309065 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147324085 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.147368908 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.147418976 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.147485971 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.179395914 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.179446936 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.179497004 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.179543972 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.179613113 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.179670095 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.181169033 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.213150978 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.213274956 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.213319063 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.213356018 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.213402987 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.213423967 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.213474989 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.213483095 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.244362116 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.244465113 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.244529009 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.244571924 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.244611979 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.244664907 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.290923119 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.291002989 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.291083097 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.291162014 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.291218996 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.291227102 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.322443962 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.322520971 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.322700977 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.322752953 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.353578091 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.353806019 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.354032040 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.354074955 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.354110956 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.354149103 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.387209892 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.387274981 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.387435913 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.389147043 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.723454952 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.723639965 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.725682974 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.754169941 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.754210949 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:00.754333019 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:00.830837965 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.139673948 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.139774084 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.170288086 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.170315981 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.170332909 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.170353889 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.170423031 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.172032118 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.207375050 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.207410097 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.207437038 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.207475901 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.207488060 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.207544088 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.243737936 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.244086981 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.244179964 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.634025097 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.634104013 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.664279938 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.664305925 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.664362907 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.664405107 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.694643021 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.694678068 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.694797993 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.694830894 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.713733912 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:01.726950884 CEST202249769194.31.98.116192.168.2.4
                            May 12, 2022 04:19:01.727138042 CEST497692022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:05.782777071 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:05.823791027 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:05.823951006 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:05.824498892 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:05.929681063 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:05.929935932 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:05.964976072 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.117126942 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.243874073 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.454132080 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.454221010 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.454287052 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.454349995 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.454395056 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.454482079 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.484844923 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.484878063 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.484898090 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.484919071 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.484939098 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.484960079 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.484981060 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.485043049 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.485105038 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.515845060 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.515903950 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.515945911 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.515979052 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516005993 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516031027 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516031981 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516062021 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516072989 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516073942 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516078949 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516098022 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516103983 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516132116 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516143084 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516156912 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516160011 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516180038 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516189098 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.516211987 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.516232967 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.546392918 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546432018 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546452999 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546473026 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546494961 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546518087 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546540976 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546564102 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546562910 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.546582937 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.546588898 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.546590090 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.546632051 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.546644926 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.546652079 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.546672106 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.576961994 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.577001095 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.577023983 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.577045918 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.577156067 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.577200890 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.577207088 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.577212095 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.608316898 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.608362913 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.608391047 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.608406067 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.608422041 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.608438969 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.608457088 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.608500004 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.608557940 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.639329910 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639355898 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639369965 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639386892 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639405012 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639420033 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639436007 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639451027 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.639537096 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.639595985 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.670186043 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670272112 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670301914 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670330048 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670356989 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670386076 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670414925 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670443058 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670470953 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.670500040 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.670564890 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.670573950 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.670579910 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.701879025 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.701951981 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.701980114 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.702018023 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.702033997 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.702044964 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.702061892 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.702069044 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.702090979 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.702204943 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.711904049 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.733149052 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.733216047 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.733266115 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.733279943 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.733315945 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.733340979 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.733376026 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.733412981 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.764389992 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.764470100 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.764513969 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.764539957 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.764625072 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.764718056 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.795737028 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.795770884 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.795895100 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.826128960 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.826226950 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.856842995 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.856930971 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.887986898 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.888111115 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.918839931 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.919822931 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:06.951066971 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:06.952629089 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.087476015 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.088610888 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.119226933 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.120552063 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.151719093 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.151890993 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.188170910 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.188239098 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.188278913 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.188298941 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.188319921 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.188333988 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.188360929 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.188374043 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.188400030 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.188458920 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.218894005 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.218966007 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.219018936 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.219036102 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.219052076 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.219078064 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.219093084 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.219119072 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.219158888 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.219173908 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.251610994 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.251646042 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.251667976 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.251691103 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.251713037 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.251715899 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.251739979 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.251754999 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.251764059 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.251815081 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.283350945 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283390999 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283416986 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283442020 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283468008 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283493996 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283495903 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.283510923 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.283523083 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283555984 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.283597946 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283622026 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.283659935 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.315176964 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315220118 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315241098 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315260887 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315284014 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315303087 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315324068 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315329075 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.315346956 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315371990 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.315372944 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.315380096 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.315385103 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.315427065 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.346128941 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346163988 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346185923 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346208096 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346229076 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346251011 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346273899 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346299887 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346318960 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.346323013 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346349955 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346358061 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.346364021 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.346376896 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.346411943 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.376421928 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376454115 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376524925 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376549959 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376573086 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376595974 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376602888 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.376620054 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376641989 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.376646042 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376648903 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.376669884 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376694918 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376713037 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.376720905 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.376744032 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.376797915 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.406869888 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.406919956 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.406951904 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.406970978 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.406991959 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407012939 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407032013 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407052994 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407063007 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.407073021 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407095909 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407103062 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.407118082 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407140017 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407140970 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.407161951 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.407161951 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.407202005 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.437953949 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.437984943 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.437999964 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.438015938 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.438033104 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.438069105 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.438116074 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.438122988 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.438127995 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.468827009 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.468859911 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.468875885 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.469044924 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.469101906 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.469110966 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.500067949 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.500133991 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.500344992 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.500399113 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.530414104 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.530468941 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.530498981 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.530551910 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.530606031 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.530669928 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.561522961 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.561686993 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.590936899 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.591228008 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.621432066 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.621712923 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.653393984 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.653567076 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.697077990 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:07.699750900 CEST202249770194.31.98.116192.168.2.4
                            May 12, 2022 04:19:07.699996948 CEST497702022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:11.861258984 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:11.898929119 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:11.899074078 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:11.899573088 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.164607048 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.317312002 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.367691994 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.374377012 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.405749083 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.461435080 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.738663912 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.897094011 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.897134066 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.897157907 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.897183895 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.897247076 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.897269964 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.897274971 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.897278070 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.929469109 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929538012 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929578066 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929615021 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929639101 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.929656029 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929696083 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929706097 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.929724932 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.929735899 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929776907 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.929788113 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.960869074 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.960942984 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.960973024 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961002111 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961060047 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961060047 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961064100 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961114883 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961116076 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961172104 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961199045 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961226940 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961229086 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961282015 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961338043 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961345911 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961399078 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.961505890 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.961512089 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.995381117 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995454073 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995495081 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995533943 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995567083 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.995572090 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995600939 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.995610952 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995646954 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.995650053 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995651960 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.995682955 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.995688915 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995703936 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:12.995729923 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:12.995780945 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.031158924 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.031223059 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.031306028 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.071430922 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.071504116 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.071548939 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.071588993 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.071623087 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.071666956 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.103869915 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.103941917 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.104020119 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.104068041 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.135456085 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.135529995 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.135581017 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.135586023 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.135622025 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.135623932 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.135680914 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.135700941 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.167824984 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.167953014 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.534240961 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.534528017 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.566009998 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.566055059 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.566206932 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.566395044 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.596617937 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.596853018 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.635839939 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.635905981 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.635950089 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.635992050 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.636065960 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.636123896 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.666728973 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.666800022 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.666882992 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.666923046 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.666954994 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.666961908 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.667011976 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.698127031 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.698201895 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.698244095 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.698285103 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.698376894 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.698426962 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.730531931 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.730602026 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.730640888 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.730654955 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.730680943 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.730690956 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.730745077 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.751672029 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.761727095 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.761802912 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.761843920 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.761894941 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.761892080 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.761934996 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.761939049 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.761945963 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.761950970 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.762017965 CEST202249771194.31.98.116192.168.2.4
                            May 12, 2022 04:19:13.762036085 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:13.762074947 CEST497712022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:17.942842007 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:17.984348059 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:17.984545946 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:18.977181911 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.036122084 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.037126064 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.118863106 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.119024038 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.143908024 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.212093115 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.399645090 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.479232073 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.479376078 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.563128948 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.643923998 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.643965960 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.643982887 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.644001007 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.644038916 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.644071102 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.675257921 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675301075 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675323009 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675343037 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675364017 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675384045 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675410986 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675438881 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.675479889 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.675524950 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705405951 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705451012 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705491066 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705521107 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705529928 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705548048 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705570936 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705578089 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705610991 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705619097 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705651045 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705656052 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705692053 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705697060 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705733061 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705756903 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705774069 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705790043 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705813885 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705820084 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705852985 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.705864906 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.705898046 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739506006 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739576101 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739600897 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739615917 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739643097 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739656925 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739671946 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739696980 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739706993 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739741087 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739753962 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739784002 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739823103 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739837885 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739866972 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739912987 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.739923954 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.739980936 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.740039110 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.775094032 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775151014 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775190115 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775227070 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.775229931 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775273085 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775295973 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.775311947 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775351048 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775360107 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.775392056 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775430918 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.775445938 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.807457924 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807529926 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807539940 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.807573080 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807610989 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807636023 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.807651043 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807691097 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807718992 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.807728052 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807768106 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807785034 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.807822943 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.807873964 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.837526083 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837589979 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837632895 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837658882 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.837672949 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837712049 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837721109 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.837754965 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837795019 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837802887 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.837836027 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837877035 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837899923 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.837914944 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837955952 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.837961912 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.868809938 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.868863106 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.868904114 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.868943930 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.868978024 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.868984938 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.869009018 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.869026899 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.869030952 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.869071960 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.869110107 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.869136095 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.869158983 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.898989916 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.899245977 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.904676914 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.904748917 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.904794931 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.904840946 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.904881001 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.904885054 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.904908895 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.904931068 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.904939890 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.904974937 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.904999971 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.939280987 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939321041 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939424038 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939446926 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939455986 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.939503908 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.939507008 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.939542055 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.939569950 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939627886 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939642906 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.939701080 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939724922 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.939757109 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.971858978 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.971952915 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.971992970 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.972004890 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.972034931 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.972047091 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:19.972076893 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:19.972141027 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.003408909 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.003509998 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.003557920 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.003603935 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.003643990 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.003662109 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.003700018 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.003714085 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.018596888 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.033761024 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.033907890 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.033948898 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.034024000 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.343179941 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.343297005 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.376631975 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.376665115 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.376718044 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.406074047 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.406224012 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.438291073 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.438361883 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.438379049 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.438406944 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.438446045 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.438471079 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.438487053 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.438528061 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.469371080 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.469454050 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.469496012 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.469541073 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.502810001 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.502929926 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.508999109 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.509213924 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.534480095 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.534557104 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.534605980 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.534615040 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.534660101 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.534672976 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.534703970 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.534732103 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.534738064 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.534805059 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.541155100 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.541325092 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.571130037 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.571250916 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.601587057 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.601675987 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.635309935 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.635441065 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.666538000 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.666598082 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.666651011 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.666691065 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.699331999 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.699424982 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.730585098 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.730722904 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.870155096 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.870276928 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.899426937 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.899483919 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.899563074 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.899593115 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.929423094 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.929497004 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.959856987 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.959975958 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.960035086 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.960084915 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.960104942 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.960133076 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.960139036 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.960196018 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.960236073 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.990814924 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.990937948 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.990998983 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.991005898 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.991061926 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.991117001 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:20.991122007 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.991184950 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:20.991231918 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.022011042 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.022089005 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.022147894 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.022161007 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.022207022 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.022213936 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.022264957 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.022267103 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.022320032 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.022331953 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.022384882 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.025770903 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.052752018 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.052787066 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.052805901 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.052824020 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.052840948 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.052858114 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.052858114 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.052875042 CEST202249773194.31.98.116192.168.2.4
                            May 12, 2022 04:19:21.052901030 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.052934885 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:21.052944899 CEST497732022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.119447947 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.151186943 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.153881073 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.160988092 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.210299969 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.400269985 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.430367947 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.430713892 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.465873957 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.509650946 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.679193974 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.897013903 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.897051096 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.897077084 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.897102118 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.897160053 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.897211075 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.928222895 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928283930 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928325891 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928364038 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928402901 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928441048 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928431034 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.928502083 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.928510904 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928513050 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.928558111 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.928611040 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959314108 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959383965 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959429979 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959453106 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959465981 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959476948 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959501982 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959527016 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959532976 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959552050 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959552050 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959587097 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959592104 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959609032 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959619999 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959635973 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959642887 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959656000 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959670067 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959695101 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959697962 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959717989 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.959732056 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959753990 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.959774971 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.989272118 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.989298105 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.989379883 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.989418983 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.989801884 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.989847898 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.989864111 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.989878893 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.989907026 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.989912033 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.989932060 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.989959002 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.989993095 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.990005970 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.990042925 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.990071058 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.990088940 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:25.990154028 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:25.990200996 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.010606050 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026458025 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026505947 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026546001 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026578903 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026586056 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026621103 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026626110 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026628971 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026648045 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026670933 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026690960 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026710987 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026714087 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026751995 CEST202249797194.31.98.116192.168.2.4
                            May 12, 2022 04:19:26.026768923 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:26.026789904 CEST497972022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:30.092452049 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:30.131242037 CEST202249816194.31.98.116192.168.2.4
                            May 12, 2022 04:19:30.131377935 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:30.131962061 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:30.172997952 CEST202249816194.31.98.116192.168.2.4
                            May 12, 2022 04:19:30.385029078 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:30.416757107 CEST202249816194.31.98.116192.168.2.4
                            May 12, 2022 04:19:30.425002098 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:30.456336021 CEST202249816194.31.98.116192.168.2.4
                            May 12, 2022 04:19:30.572583914 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:30.724159956 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:31.010855913 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:31.042643070 CEST202249816194.31.98.116192.168.2.4
                            May 12, 2022 04:19:31.042843103 CEST498162022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:35.086833000 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:35.116300106 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:35.116434097 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:35.133701086 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:35.191914082 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:35.204010010 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:35.236269951 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:35.389826059 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.011524916 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.092102051 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.246969938 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.332072973 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.369029999 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.369095087 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.369133949 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.369175911 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.369188070 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.369232893 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.398921013 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.398979902 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.399022102 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.399050951 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.399061918 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.399101019 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.399116993 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.399141073 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.399179935 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.399192095 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.399219036 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.399269104 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430103064 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430164099 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430203915 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430217981 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430243015 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430249929 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430257082 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430283070 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430296898 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430322886 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430335045 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430366039 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430373907 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430404902 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430419922 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430445910 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.430454969 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.430495977 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.460946083 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461000919 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461045027 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461062908 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461108923 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461114883 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461384058 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461424112 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461447954 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461457014 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461486101 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461493969 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461500883 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461534977 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461544991 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461574078 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461581945 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461621046 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461642027 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.461664915 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461704969 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.461719036 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.491444111 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.491508007 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.491522074 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.491552114 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.491601944 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.491652012 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.491698027 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.491734982 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.491749048 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.527724981 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.527776957 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.527810097 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.527841091 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.527847052 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.527873039 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.527873993 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.527906895 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.527932882 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.527936935 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.527990103 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.563827038 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.563886881 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.563924074 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.563936949 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.563961029 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.563997984 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.564011097 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.564033985 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.564071894 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.564101934 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.564106941 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.564145088 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.564155102 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.597187042 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597249985 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597284079 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.597651005 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597697020 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597718954 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.597737074 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597776890 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597791910 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.597815990 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597856998 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597865105 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.597898960 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.597949028 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.627938986 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628004074 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628084898 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.628088951 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628247023 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628289938 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628315926 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.628329992 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628371000 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628395081 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.628410101 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628432035 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.628449917 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.628468990 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.628496885 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659352064 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659421921 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659463882 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659473896 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659502983 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659507990 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659514904 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659544945 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659567118 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659585953 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659600019 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659627914 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659645081 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659668922 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659682989 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659712076 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659723043 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659751892 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.659766912 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.659826994 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.691128969 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.691195965 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.691237926 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.691274881 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.691314936 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.691317081 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.691334963 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.691356897 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.691399097 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.691400051 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.723196030 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.723268032 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.723298073 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.723337889 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.723500967 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.723525047 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.753843069 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.753901005 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.753942013 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.753956079 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.753983021 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.753987074 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.753993988 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.754040956 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.785053968 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.785125017 CEST202249830194.31.98.116192.168.2.4
                            May 12, 2022 04:19:36.785145998 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:36.785211086 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:37.041227102 CEST498302022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.100194931 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.131103992 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.131308079 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.132097006 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.214765072 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.249274969 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.249634027 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.288587093 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.511176109 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.661259890 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.733201981 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.779979944 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.780033112 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.780071020 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.780108929 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.780116081 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.780172110 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.811209917 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811279058 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811321974 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811362028 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811403036 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811455011 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811470032 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.811495066 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811508894 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.811537027 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.811554909 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.813296080 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.844697952 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.844760895 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.844801903 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.844841003 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.844882965 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.844928980 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.844959021 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.844973087 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845000029 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.845006943 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.845017910 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845057964 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845098019 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845115900 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.845139027 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845179081 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845201969 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.845247984 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845288038 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845302105 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.845341921 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.845904112 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.845946074 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.846018076 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875121117 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875184059 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875228882 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875272989 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875313997 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875338078 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875355959 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875377893 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875397921 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875437021 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875458002 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875483036 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875521898 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875539064 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875566006 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875581026 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875608921 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875648022 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875669956 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875689030 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875730038 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875766993 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875786066 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875807047 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875823975 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875849009 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875889063 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875905991 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.875932932 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875972986 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.875992060 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.876013994 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876054049 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876091957 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876095057 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.876132011 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876171112 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876188993 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.876216888 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876259089 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876276970 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.876298904 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876338959 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876354933 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.876380920 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876393080 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.876420975 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.876480103 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.907521009 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907596111 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907639027 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907677889 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907721043 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907759905 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907800913 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907840014 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907843113 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.907881021 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907891035 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.907898903 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.907924891 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.907963991 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908004045 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908023119 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908045053 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908083916 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908099890 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908126116 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908140898 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908169031 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908211946 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908231974 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908255100 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908262968 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908337116 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908379078 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908392906 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908420086 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908425093 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908433914 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908462048 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908484936 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908518076 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908548117 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908591032 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908629894 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908647060 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908668995 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908668995 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908680916 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908713102 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908751011 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908767939 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908787966 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908792973 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908799887 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908833027 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908850908 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908879995 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908893108 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.908922911 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.908977985 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.939580917 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939665079 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939723015 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939766884 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939801931 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.939805984 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939847946 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.939850092 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939855099 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.939892054 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939932108 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939951897 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.939973116 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.939990044 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940016985 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940027952 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940061092 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940071106 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940102100 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940140963 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940157890 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940182924 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940227985 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940241098 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940269947 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940304041 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940331936 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940346003 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940346956 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940351963 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940390110 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940422058 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940445900 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940463066 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940486908 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940526009 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940531015 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940573931 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940582037 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940606117 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940645933 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940658092 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940679073 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940690041 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940696955 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940721989 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940736055 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940757990 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940778017 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940790892 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940824986 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940833092 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940864086 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940865040 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940879107 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.940898895 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.940953016 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.941255093 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972047091 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972110033 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972146988 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972182989 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972207069 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972229004 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972251892 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972271919 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972280025 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972290039 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972313881 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972352982 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972362995 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972395897 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972405910 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972424030 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972446918 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:41.972466946 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:41.972498894 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003199100 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003261089 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003302097 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003341913 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003381014 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003390074 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003429890 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003472090 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003519058 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003559113 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003578901 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003599882 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003606081 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003640890 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003655910 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003701925 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003748894 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003787994 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003813028 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003828049 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003850937 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.003869057 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003926039 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003964901 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.003983974 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.004005909 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.004024982 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.004048109 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.004087925 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.004127979 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.004128933 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.005255938 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.034915924 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.034979105 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035017967 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035058022 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035098076 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035139084 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035149097 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035180092 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035190105 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035197973 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035224915 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035263062 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035304070 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035326004 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035343885 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035362959 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035418034 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035459042 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035478115 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035500050 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035542011 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035581112 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035598993 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035619974 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035641909 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035660982 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035700083 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035739899 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035761118 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035783052 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035792112 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.035823107 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035862923 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.035887957 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.067394972 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067456007 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067495108 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067536116 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067574978 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067584991 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.067615032 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067625046 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.067656994 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067679882 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.067698956 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067739964 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067756891 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.067784071 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067822933 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067838907 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.067866087 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067878008 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.067907095 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067945957 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067984104 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.067985058 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.068023920 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068039894 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.068065882 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068108082 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068133116 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.068147898 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068187952 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068232059 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068252087 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.068273067 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068311930 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068330050 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.068352938 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068372965 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.068394899 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.068464041 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.098970890 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099049091 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099090099 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099136114 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099178076 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099175930 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099222898 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099227905 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099263906 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099303007 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099332094 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099344015 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099385977 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099412918 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099425077 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099462032 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099467993 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099509001 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099540949 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099549055 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099590063 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099623919 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099630117 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099669933 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099710941 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099730968 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099750996 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099803925 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099809885 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099860907 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099869013 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099919081 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.099978924 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.099980116 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.100028992 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.100068092 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.100090981 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.100111008 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.100150108 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.100176096 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.105531931 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.132819891 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.132882118 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.132925987 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.132966995 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133007050 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133045912 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133085012 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133126974 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133167028 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133168936 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133205891 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133263111 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133270979 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133272886 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133280993 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133332968 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133374929 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133409977 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133416891 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133430958 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133440971 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133457899 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133498907 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133539915 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133582115 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133624077 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133625031 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133642912 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133651018 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133663893 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133702993 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133740902 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133742094 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133759975 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133783102 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133822918 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133825064 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133852005 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133862972 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133893013 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133903027 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.133920908 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.133943081 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.134069920 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.137200117 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.138505936 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.167849064 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.167905092 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.167946100 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.167985916 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168020964 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.168026924 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168081999 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168095112 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.168122053 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168159962 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168173075 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.168200970 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168246031 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168251038 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.168283939 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168323994 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168333054 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.168364048 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168401003 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168411016 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:42.168441057 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:42.168520927 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:43.154786110 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:46.171498060 CEST202249833194.31.98.116192.168.2.4
                            May 12, 2022 04:19:46.171668053 CEST498332022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:47.336641073 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:47.367834091 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:47.367980957 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:47.368674040 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:47.416392088 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:47.416773081 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:47.758385897 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:47.950335979 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.017110109 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.095807076 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:48.215646029 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.250411987 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:48.449300051 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.480217934 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:48.498120070 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.580954075 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:48.581469059 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.612715960 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:48.672854900 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.703294992 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:48.756731987 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:48.843415022 CEST202249834194.31.98.116192.168.2.4
                            May 12, 2022 04:19:49.497067928 CEST498342022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:53.576076031 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:56.590749979 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:56.610760927 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:56.610904932 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:56.611526966 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:56.660430908 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:56.660904884 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:56.693353891 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:56.746973991 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:57.247514009 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:57.282269001 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:57.881710052 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:57.938569069 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.083559036 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.084856033 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:58.115405083 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.116581917 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:58.148529053 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.150845051 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:58.182785988 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.208455086 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:58.250665903 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.253292084 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:58.297965050 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.552743912 CEST202249854194.31.98.116192.168.2.4
                            May 12, 2022 04:19:58.606549978 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:19:59.318685055 CEST498542022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:03.422391891 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:03.454149961 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:03.454325914 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:03.455105066 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:03.530546904 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:03.536286116 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:03.853962898 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:03.919511080 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:04.180517912 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:04.254964113 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:04.311064959 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:04.416948080 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:04.435776949 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:04.535264969 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:04.565743923 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:04.622737885 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:04.760155916 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:04.791507006 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:04.791709900 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:04.821758986 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:04.919671059 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:05.370733976 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:05.810359001 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:05.892846107 CEST202249859194.31.98.116192.168.2.4
                            May 12, 2022 04:20:06.416002989 CEST498592022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:10.551261902 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:10.582540989 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:10.582703114 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:10.583511114 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:10.669285059 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:10.673903942 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:10.705763102 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:10.826389074 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:10.853852987 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:10.935735941 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:10.935870886 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:11.013709068 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:11.173301935 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:11.174348116 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:11.205276966 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:11.206512928 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:11.238859892 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:11.238976955 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:11.270102978 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:11.270289898 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:11.623384953 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:11.654129982 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:14.751827002 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:14.796544075 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:15.628614902 CEST202249863194.31.98.116192.168.2.4
                            May 12, 2022 04:20:15.670634985 CEST498632022192.168.2.4194.31.98.116
                            May 12, 2022 04:20:20.632430077 CEST202249863194.31.98.116192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            May 12, 2022 04:18:36.547081947 CEST6445453192.168.2.48.8.8.8
                            May 12, 2022 04:18:36.568968058 CEST53644548.8.8.8192.168.2.4
                            May 12, 2022 04:18:42.931068897 CEST6427753192.168.2.48.8.8.8
                            May 12, 2022 04:18:42.953504086 CEST53642778.8.8.8192.168.2.4
                            May 12, 2022 04:18:49.904836893 CEST6075853192.168.2.48.8.8.8
                            May 12, 2022 04:18:49.926238060 CEST53607588.8.8.8192.168.2.4
                            May 12, 2022 04:18:54.971676111 CEST6490953192.168.2.48.8.8.8
                            May 12, 2022 04:18:54.990967035 CEST53649098.8.8.8192.168.2.4
                            May 12, 2022 04:19:05.763829947 CEST6038153192.168.2.48.8.8.8
                            May 12, 2022 04:19:05.781066895 CEST53603818.8.8.8192.168.2.4
                            May 12, 2022 04:19:11.760876894 CEST5650953192.168.2.48.8.8.8
                            May 12, 2022 04:19:11.860119104 CEST53565098.8.8.8192.168.2.4
                            May 12, 2022 04:19:17.909548044 CEST5774753192.168.2.48.8.8.8
                            May 12, 2022 04:19:17.929116011 CEST53577478.8.8.8192.168.2.4
                            May 12, 2022 04:19:25.096853018 CEST5881653192.168.2.48.8.8.8
                            May 12, 2022 04:19:25.115648031 CEST53588168.8.8.8192.168.2.4
                            May 12, 2022 04:19:30.064125061 CEST6108153192.168.2.48.8.8.8
                            May 12, 2022 04:19:30.083575964 CEST53610818.8.8.8192.168.2.4
                            May 12, 2022 04:19:35.064435005 CEST6041853192.168.2.48.8.8.8
                            May 12, 2022 04:19:35.085571051 CEST53604188.8.8.8192.168.2.4
                            May 12, 2022 04:19:41.077682972 CEST6106853192.168.2.48.8.8.8
                            May 12, 2022 04:19:41.099010944 CEST53610688.8.8.8192.168.2.4
                            May 12, 2022 04:19:47.313771963 CEST5871553192.168.2.48.8.8.8
                            May 12, 2022 04:19:47.334959984 CEST53587158.8.8.8192.168.2.4
                            May 12, 2022 04:19:53.554749012 CEST5781653192.168.2.48.8.8.8
                            May 12, 2022 04:19:53.573904037 CEST53578168.8.8.8192.168.2.4
                            May 12, 2022 04:20:03.402129889 CEST5178753192.168.2.48.8.8.8
                            May 12, 2022 04:20:03.420929909 CEST53517878.8.8.8192.168.2.4
                            May 12, 2022 04:20:10.445477009 CEST5391653192.168.2.48.8.8.8
                            May 12, 2022 04:20:10.466628075 CEST53539168.8.8.8192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            May 12, 2022 04:18:36.547081947 CEST192.168.2.48.8.8.80x8850Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:18:42.931068897 CEST192.168.2.48.8.8.80x640Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:18:49.904836893 CEST192.168.2.48.8.8.80x419cStandard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:18:54.971676111 CEST192.168.2.48.8.8.80x99d8Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:05.763829947 CEST192.168.2.48.8.8.80xa5bfStandard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:11.760876894 CEST192.168.2.48.8.8.80xe1a4Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:17.909548044 CEST192.168.2.48.8.8.80x6cfbStandard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:25.096853018 CEST192.168.2.48.8.8.80x48f1Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:30.064125061 CEST192.168.2.48.8.8.80xd699Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:35.064435005 CEST192.168.2.48.8.8.80x98adStandard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:41.077682972 CEST192.168.2.48.8.8.80x9c1aStandard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:47.313771963 CEST192.168.2.48.8.8.80xc9e8Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:19:53.554749012 CEST192.168.2.48.8.8.80xa0dbStandard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:20:03.402129889 CEST192.168.2.48.8.8.80xa487Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            May 12, 2022 04:20:10.445477009 CEST192.168.2.48.8.8.80x7769Standard query (0)chima2022.ddns.netA (IP address)IN (0x0001)
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            May 12, 2022 04:18:36.568968058 CEST8.8.8.8192.168.2.40x8850No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:18:42.953504086 CEST8.8.8.8192.168.2.40x640No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:18:49.926238060 CEST8.8.8.8192.168.2.40x419cNo error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:18:54.990967035 CEST8.8.8.8192.168.2.40x99d8No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:05.781066895 CEST8.8.8.8192.168.2.40xa5bfNo error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:11.860119104 CEST8.8.8.8192.168.2.40xe1a4No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:17.929116011 CEST8.8.8.8192.168.2.40x6cfbNo error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:25.115648031 CEST8.8.8.8192.168.2.40x48f1No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:30.083575964 CEST8.8.8.8192.168.2.40xd699No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:35.085571051 CEST8.8.8.8192.168.2.40x98adNo error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:41.099010944 CEST8.8.8.8192.168.2.40x9c1aNo error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:47.334959984 CEST8.8.8.8192.168.2.40xc9e8No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:19:53.573904037 CEST8.8.8.8192.168.2.40xa0dbNo error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:20:03.420929909 CEST8.8.8.8192.168.2.40xa487No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)
                            May 12, 2022 04:20:10.466628075 CEST8.8.8.8192.168.2.40x7769No error (0)chima2022.ddns.net194.31.98.116A (IP address)IN (0x0001)

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:04:18:06
                            Start date:12/05/2022
                            Path:C:\Users\user\Desktop\Bank Details.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Bank Details.exe"
                            Imagebase:0xc0000
                            File size:573440 bytes
                            MD5 hash:E62E3496DEB3EE2C512CA61CF2642A0D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.281839784.000000000360F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.280585839.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.280695946.0000000002545000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            Target ID:4
                            Start time:04:18:20
                            Start date:12/05/2022
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe
                            Imagebase:0xd50000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:5
                            Start time:04:18:21
                            Start date:12/05/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff647620000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:6
                            Start time:04:18:22
                            Start date:12/05/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmpEA4C.tmp
                            Imagebase:0x1060000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:7
                            Start time:04:18:24
                            Start date:12/05/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff647620000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:8
                            Start time:04:18:27
                            Start date:12/05/2022
                            Path:C:\Users\user\Desktop\Bank Details.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\Bank Details.exe
                            Imagebase:0x530000
                            File size:573440 bytes
                            MD5 hash:E62E3496DEB3EE2C512CA61CF2642A0D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.501615739.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.495963136.0000000000E40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.277836279.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.497746331.0000000003901000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.495078358.0000000000B50000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.493375086.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.501831791.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.496914217.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.500271666.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.496292504.0000000000E80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.275861261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.496440723.0000000000EA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.499495990.00000000045ED000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.495027956.0000000000B30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.501096037.0000000004834000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.276616550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.494831319.0000000000AE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.503251204.0000000006D21000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.494865056.0000000000AF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.496185988.0000000000E60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.495924977.0000000000E30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.501709617.0000000005260000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.274867582.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.496097202.0000000000E50000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.495050243.0000000000B40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.496960213.000000000296C000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            Target ID:20
                            Start time:04:18:42
                            Start date:12/05/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                            Imagebase:0xa70000
                            File size:573440 bytes
                            MD5 hash:E62E3496DEB3EE2C512CA61CF2642A0D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000014.00000002.343046224.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.344353611.000000000400F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000014.00000002.342911345.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 12%, ReversingLabs
                            Reputation:low

                            Target ID:23
                            Start time:04:18:50
                            Start date:12/05/2022
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nOcstjdWFAT.exe
                            Imagebase:0xd50000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:24
                            Start time:04:18:50
                            Start date:12/05/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff647620000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:25
                            Start time:04:18:50
                            Start date:12/05/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nOcstjdWFAT" /XML "C:\Users\user\AppData\Local\Temp\tmp5C9D.tmp
                            Imagebase:0x1060000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:26
                            Start time:04:18:51
                            Start date:12/05/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff647620000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:27
                            Start time:04:18:54
                            Start date:12/05/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Imagebase:0x960000
                            File size:573440 bytes
                            MD5 hash:E62E3496DEB3EE2C512CA61CF2642A0D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.333597791.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.331990399.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.358941413.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.360814812.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.360570995.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.334288082.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.332881554.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            Reset < >

                              Execution Graph

                              Execution Coverage:11%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:143
                              Total number of Limit Nodes:9
                              execution_graph 18221 a9bdb8 DuplicateHandle 18222 a9be4e 18221->18222 18282 a99798 18286 a9988c 18282->18286 18294 a99890 18282->18294 18283 a997a7 18287 a998a3 18286->18287 18288 a998bb 18287->18288 18302 a99b09 18287->18302 18306 a99b18 18287->18306 18288->18283 18289 a99ab8 GetModuleHandleW 18291 a99ae5 18289->18291 18290 a998b3 18290->18288 18290->18289 18291->18283 18295 a998a3 18294->18295 18296 a998bb 18295->18296 18300 a99b09 LoadLibraryExW 18295->18300 18301 a99b18 LoadLibraryExW 18295->18301 18296->18283 18297 a998b3 18297->18296 18298 a99ab8 GetModuleHandleW 18297->18298 18299 a99ae5 18298->18299 18299->18283 18300->18297 18301->18297 18303 a99b2c 18302->18303 18305 a99b51 18303->18305 18310 a99288 18303->18310 18305->18290 18307 a99b2c 18306->18307 18308 a99288 LoadLibraryExW 18307->18308 18309 a99b51 18307->18309 18308->18309 18309->18290 18311 a99cf8 LoadLibraryExW 18310->18311 18313 a99d71 18311->18313 18313->18305 18223 7048610 18224 7048625 18223->18224 18227 6e77a40 18224->18227 18228 6e77a85 SetThreadContext 18227->18228 18230 6e77acd 18228->18230 18239 7048860 18240 70489eb 18239->18240 18241 7048886 18239->18241 18241->18240 18243 7048ae0 PostMessageW 18241->18243 18244 7048b4c 18243->18244 18244->18241 18245 70468a0 18246 70468b5 18245->18246 18251 70468e3 18246->18251 18255 70468d9 18246->18255 18260 70468e8 18246->18260 18247 70468cb 18252 7046902 18251->18252 18264 7046eb8 18252->18264 18256 70468e3 2 API calls 18255->18256 18257 70468df 18256->18257 18259 7046eb8 2 API calls 18257->18259 18258 704690a 18258->18247 18259->18258 18261 7046902 18260->18261 18263 7046eb8 2 API calls 18261->18263 18262 704690a 18262->18247 18263->18262 18265 7046ecd 18264->18265 18268 7046f00 18265->18268 18266 704690a 18266->18247 18269 7046f33 18268->18269 18274 6e77fe0 18269->18274 18270 7047187 18272 6e77960 ResumeThread 18270->18272 18271 7047e51 18272->18271 18275 6e78069 CreateProcessA 18274->18275 18277 6e7822b 18275->18277 18314 a9bb90 GetCurrentProcess 18315 a9bc0a GetCurrentThread 18314->18315 18316 a9bc03 18314->18316 18317 a9bc40 18315->18317 18318 a9bc47 GetCurrentProcess 18315->18318 18316->18315 18317->18318 18319 a9bc7d 18318->18319 18320 a9bca5 GetCurrentThreadId 18319->18320 18321 a9bcd6 18320->18321 18322 a940d0 18323 a940ec 18322->18323 18324 a940fd 18323->18324 18328 a94288 18323->18328 18333 a9389c 18324->18333 18326 a9411c 18329 a942ad 18328->18329 18337 a94388 18329->18337 18341 a94378 18329->18341 18334 a938a7 18333->18334 18349 a9568c 18334->18349 18336 a96adb 18336->18326 18338 a943af 18337->18338 18339 a9448c 18338->18339 18345 a93f88 18338->18345 18343 a94383 18341->18343 18342 a9448c 18343->18342 18344 a93f88 CreateActCtxA 18343->18344 18344->18342 18346 a95818 CreateActCtxA 18345->18346 18348 a958db 18346->18348 18348->18348 18350 a95697 18349->18350 18353 a956bc 18350->18353 18352 a96ca5 18352->18336 18354 a956c7 18353->18354 18357 a956ec 18354->18357 18356 a96d82 18356->18352 18358 a956f7 18357->18358 18361 a9571c 18358->18361 18360 a96e82 18360->18356 18363 a95727 18361->18363 18362 a975dc 18362->18360 18363->18362 18365 a9b4b0 18363->18365 18366 a9b4e1 18365->18366 18367 a9b505 18366->18367 18370 a9ba68 18366->18370 18374 a9ba78 18366->18374 18367->18362 18371 a9ba85 18370->18371 18372 a9babf 18371->18372 18378 a9b89c 18371->18378 18372->18367 18375 a9ba85 18374->18375 18376 a9babf 18375->18376 18377 a9b89c 2 API calls 18375->18377 18376->18367 18377->18376 18379 a9b8a7 18378->18379 18381 a9c3b0 18379->18381 18382 a9b984 18379->18382 18381->18381 18383 a9b98f 18382->18383 18384 a9571c 2 API calls 18383->18384 18386 a9c41f 18383->18386 18384->18386 18385 a9c458 18385->18381 18389 a9e1a8 18386->18389 18395 a9e190 18386->18395 18390 a9e225 18389->18390 18392 a9e1d9 18389->18392 18390->18385 18391 a9e1e5 18391->18385 18392->18391 18393 a9e628 LoadLibraryExW GetModuleHandleW 18392->18393 18394 a9e618 LoadLibraryExW GetModuleHandleW 18392->18394 18393->18390 18394->18390 18397 a9e1d9 18395->18397 18398 a9e225 18395->18398 18396 a9e1e5 18396->18385 18397->18396 18399 a9e628 LoadLibraryExW GetModuleHandleW 18397->18399 18400 a9e618 LoadLibraryExW GetModuleHandleW 18397->18400 18398->18385 18399->18398 18400->18398 18231 7048658 18232 704866d 18231->18232 18235 6e77bd8 18232->18235 18236 6e77c18 VirtualAllocEx 18235->18236 18238 6e77c55 18236->18238 18217 6e77de8 18218 6e77e33 ReadProcessMemory 18217->18218 18220 6e77e77 18218->18220 18278 6e77cc8 18279 6e77d10 WriteProcessMemory 18278->18279 18281 6e77d67 18279->18281

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 00A9BBF0
                              • GetCurrentThread.KERNEL32 ref: 00A9BC2D
                              • GetCurrentProcess.KERNEL32 ref: 00A9BC6A
                              • GetCurrentThreadId.KERNEL32 ref: 00A9BCC3
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: 8fda65f02d358f4c6a52149e79c647af3b05ab1c4859f0fbfbf3dde9576cecad
                              • Instruction ID: 859017ddb1fa682e86674c449bd238ce7e0bcf3c85a8db18c4a3873cb89c91f8
                              • Opcode Fuzzy Hash: 8fda65f02d358f4c6a52149e79c647af3b05ab1c4859f0fbfbf3dde9576cecad
                              • Instruction Fuzzy Hash: 285149B4E002898FDB14CFA9D6887EEBBF0EF89314F14849AE449A7361DB745944CF61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 00A9BBF0
                              • GetCurrentThread.KERNEL32 ref: 00A9BC2D
                              • GetCurrentProcess.KERNEL32 ref: 00A9BC6A
                              • GetCurrentThreadId.KERNEL32 ref: 00A9BCC3
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: 4046c0f5135c4fc2f111504541d9b04de9787faf070ff54db0ce11cf92bc5356
                              • Instruction ID: 5586ebc8bd37612a3ab85b78cef29620fba72e676f2449f13d277d1d1303b51a
                              • Opcode Fuzzy Hash: 4046c0f5135c4fc2f111504541d9b04de9787faf070ff54db0ce11cf92bc5356
                              • Instruction Fuzzy Hash: C15137B4E002498FDB14CFA9D648BDEBBF1AF88314F20845AE419B7360DB749944CF66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 331 6e77fe0-6e78075 333 6e78077-6e78081 331->333 334 6e780ae-6e780ce 331->334 333->334 335 6e78083-6e78085 333->335 341 6e78107-6e78136 334->341 342 6e780d0-6e780da 334->342 336 6e78087-6e78091 335->336 337 6e780a8-6e780ab 335->337 339 6e78095-6e780a4 336->339 340 6e78093 336->340 337->334 339->339 343 6e780a6 339->343 340->339 350 6e7816f-6e78229 CreateProcessA 341->350 351 6e78138-6e78142 341->351 342->341 344 6e780dc-6e780de 342->344 343->337 345 6e78101-6e78104 344->345 346 6e780e0-6e780ea 344->346 345->341 348 6e780ee-6e780fd 346->348 349 6e780ec 346->349 348->348 352 6e780ff 348->352 349->348 362 6e78232-6e782b8 350->362 363 6e7822b-6e78231 350->363 351->350 353 6e78144-6e78146 351->353 352->345 355 6e78169-6e7816c 353->355 356 6e78148-6e78152 353->356 355->350 357 6e78156-6e78165 356->357 358 6e78154 356->358 357->357 360 6e78167 357->360 358->357 360->355 373 6e782ba-6e782be 362->373 374 6e782c8-6e782cc 362->374 363->362 373->374 375 6e782c0 373->375 376 6e782ce-6e782d2 374->376 377 6e782dc-6e782e0 374->377 375->374 376->377 380 6e782d4 376->380 378 6e782e2-6e782e6 377->378 379 6e782f0-6e782f4 377->379 378->379 381 6e782e8 378->381 382 6e78306-6e7830d 379->382 383 6e782f6-6e782fc 379->383 380->377 381->379 384 6e78324 382->384 385 6e7830f-6e7831e 382->385 383->382 385->384
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E78216
                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 761db5f572b8da291463f528398b88fdfb22ed4bae993ae41d394a9b7389e839
                              • Instruction ID: fc23d1cc2dccf6801f9c9b4640c202f6b0cacad089b37ff568ba15b4a50b43f9
                              • Opcode Fuzzy Hash: 761db5f572b8da291463f528398b88fdfb22ed4bae993ae41d394a9b7389e839
                              • Instruction Fuzzy Hash: DC917D71D00719CFEB54CFA8C8857EEBBB2BF58318F048569D819A7280DB749985CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 387 a99890-a99898 388 a998a3-a998a5 387->388 389 a9989e call a99224 387->389 390 a998bb-a998bf 388->390 391 a998a7 388->391 389->388 392 a998c1-a998cb 390->392 393 a998d3-a99914 390->393 440 a998ad call a99b09 391->440 441 a998ad call a99b18 391->441 392->393 398 a99921-a9992f 393->398 399 a99916-a9991e 393->399 394 a998b3-a998b5 394->390 395 a999f0-a99ab0 394->395 435 a99ab8-a99ae3 GetModuleHandleW 395->435 436 a99ab2-a99ab5 395->436 401 a99931-a99936 398->401 402 a99953-a99955 398->402 399->398 403 a99938-a9993f call a99230 401->403 404 a99941 401->404 405 a99958-a9995f 402->405 407 a99943-a99951 403->407 404->407 408 a9996c-a99973 405->408 409 a99961-a99969 405->409 407->405 412 a99980-a99989 call a99240 408->412 413 a99975-a9997d 408->413 409->408 418 a9998b-a99993 412->418 419 a99996-a9999b 412->419 413->412 418->419 420 a999b9-a999bd 419->420 421 a9999d-a999a4 419->421 442 a999c0 call a99e1f 420->442 443 a999c0 call a99e20 420->443 421->420 423 a999a6-a999b6 call a99250 call a99260 421->423 423->420 424 a999c3-a999c6 428 a999e9-a999ef 424->428 429 a999c8-a999e6 424->429 429->428 437 a99aec-a99b00 435->437 438 a99ae5-a99aeb 435->438 436->435 438->437 440->394 441->394 442->424 443->424
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00A99AD6
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 278a39d9561bfb6068fe1847c64b74481d65886158db298e3151e943a76a54c3
                              • Instruction ID: 77f646d6d8a6c857547261008ef3d65ac5c5800eff8d521754bd91550acc42d2
                              • Opcode Fuzzy Hash: 278a39d9561bfb6068fe1847c64b74481d65886158db298e3151e943a76a54c3
                              • Instruction Fuzzy Hash: EE712170A00B059FDB24DF6AD1457ABB7F1BF88314F008A2ED58ADBA50DB35E845CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 444 a9580c-a9580d 445 a9580f-a9583f 444->445 446 a95841-a958d9 CreateActCtxA 444->446 445->446 448 a958db-a958e1 446->448 449 a958e2-a9593c 446->449 448->449 456 a9594b-a9594f 449->456 457 a9593e-a95941 449->457 458 a95951-a9595d 456->458 459 a95960 456->459 457->456 458->459 461 a95961 459->461 461->461
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 00A958C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: e489a20ce1644c822d0365371ca2beda7a726b5c484fdceaee9755a8066d3cb3
                              • Instruction ID: 24d9d420891092d8852bb0120076bf1fa1efab016b3708950faf52c7dd1201c3
                              • Opcode Fuzzy Hash: e489a20ce1644c822d0365371ca2beda7a726b5c484fdceaee9755a8066d3cb3
                              • Instruction Fuzzy Hash: 9B411170D00618CEDF25CFA9C889BDEBBF1BF89314F248099D409AB251DB71594ACF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 462 a93f88-a958d9 CreateActCtxA 465 a958db-a958e1 462->465 466 a958e2-a9593c 462->466 465->466 473 a9594b-a9594f 466->473 474 a9593e-a95941 466->474 475 a95951-a9595d 473->475 476 a95960 473->476 474->473 475->476 478 a95961 476->478 478->478
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 00A958C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 20b45036eb740747e814d4c7c6e3a4c60e9b1df9712f2e4f4674ad3cc85b88ef
                              • Instruction ID: 34369493be00a26ba3470954eca0732c590182f61f10f6481476042e411a5c41
                              • Opcode Fuzzy Hash: 20b45036eb740747e814d4c7c6e3a4c60e9b1df9712f2e4f4674ad3cc85b88ef
                              • Instruction Fuzzy Hash: 7241F170D00618CBEF24CFA9C88978EBBF1BF88314F20846AD409AB251DB75594ACF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 479 6e77cc8-6e77d16 481 6e77d26-6e77d65 WriteProcessMemory 479->481 482 6e77d18-6e77d24 479->482 484 6e77d67-6e77d6d 481->484 485 6e77d6e-6e77d9e 481->485 482->481 484->485
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E77D58
                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: ace91f956a22cdf839d35674b7e03c60098d1bae03b6c8d407d6dbbb1c9f9b81
                              • Instruction ID: d5cc8aaf431a0970490749c80934300c521cefb3dc66af3f10be805451d77941
                              • Opcode Fuzzy Hash: ace91f956a22cdf839d35674b7e03c60098d1bae03b6c8d407d6dbbb1c9f9b81
                              • Instruction Fuzzy Hash: B42115719003099FCF50CFA9C984BEEBBF5FB48324F10842AEA19A7250D7789945CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 489 a9bdb0-a9be4c DuplicateHandle 490 a9be4e-a9be54 489->490 491 a9be55-a9be72 489->491 490->491
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A9BE3F
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 30821184270863d3e686a8cb7ef69b70aba2fd3db620c107f0f7c8fdc13b1707
                              • Instruction ID: 148efc3b4ef0a731d24c7de17a342d4ad0d932d39d19647e6adb3db61d02d84b
                              • Opcode Fuzzy Hash: 30821184270863d3e686a8cb7ef69b70aba2fd3db620c107f0f7c8fdc13b1707
                              • Instruction Fuzzy Hash: E421FFB59002499FDB10CFA9D984BEEBBF8EB48324F14801AE954A3250D374A941CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 494 6e77a40-6e77a8b 496 6e77a8d-6e77a99 494->496 497 6e77a9b-6e77acb SetThreadContext 494->497 496->497 499 6e77ad4-6e77b04 497->499 500 6e77acd-6e77ad3 497->500 500->499
                              APIs
                              • SetThreadContext.KERNELBASE(?,00000000), ref: 06E77ABE
                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID: ContextThread
                              • String ID:
                              • API String ID: 1591575202-0
                              • Opcode ID: b7d0153d69145464925e9ce586278184a84d665eb16695a878f38a84e2cc5db1
                              • Instruction ID: b6a549bb9127ce92e7686fb38dac4c20de7963338c38ae664e0e0daf2561184c
                              • Opcode Fuzzy Hash: b7d0153d69145464925e9ce586278184a84d665eb16695a878f38a84e2cc5db1
                              • Instruction Fuzzy Hash: FB211A71D003098FDB50CFA9C5847EEBBF4EF48324F158429D559A7240DB789945CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 504 6e77de8-6e77e75 ReadProcessMemory 507 6e77e77-6e77e7d 504->507 508 6e77e7e-6e77eae 504->508 507->508
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E77E68
                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 920cd0e209032951d7ca2b50a3088db579704193193170e16cc157a08cbec0d9
                              • Instruction ID: 4b7f63c9241d1a6d77a92dcd0ca6bd57b2532fc190006d928d94259f43f3e01f
                              • Opcode Fuzzy Hash: 920cd0e209032951d7ca2b50a3088db579704193193170e16cc157a08cbec0d9
                              • Instruction Fuzzy Hash: B42114B1C003099FCF10CFAAC984AEEBBF5FF48324F50842AE519A7250D7389945CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 512 a9bdb8-a9be4c DuplicateHandle 513 a9be4e-a9be54 512->513 514 a9be55-a9be72 512->514 513->514
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A9BE3F
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: b94733668e79f7d07fbbe08853fde0f7f154c99f5470748df710a6c7fdce8ea2
                              • Instruction ID: 97edd23c3b94535426bf5c4700cf604b97d6c0fc319c4f0e97ee0472eb4c6594
                              • Opcode Fuzzy Hash: b94733668e79f7d07fbbe08853fde0f7f154c99f5470748df710a6c7fdce8ea2
                              • Instruction Fuzzy Hash: 3421B0B59002089FDF10CFA9D984ADEBBF9EB48324F14841AE955A3250D374A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 517 a99cf0-a99d38 519 a99d3a-a99d3d 517->519 520 a99d40-a99d6f LoadLibraryExW 517->520 519->520 521 a99d78-a99d95 520->521 522 a99d71-a99d77 520->522 522->521
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A99B51,00000800,00000000,00000000), ref: 00A99D62
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 07dba89915a3d83189f018afa41de3c307b7a094238390e01895153225699b4d
                              • Instruction ID: 83b9cc77b3d84ad2f2e9bac1e7228acb2c6298d72ff71fb37d58469255ac88df
                              • Opcode Fuzzy Hash: 07dba89915a3d83189f018afa41de3c307b7a094238390e01895153225699b4d
                              • Instruction Fuzzy Hash: AD1103B69003489FCF10CF9AC888ADEFBF4AB88324F15841ED455A7210C775A945CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 525 a99288-a99d38 527 a99d3a-a99d3d 525->527 528 a99d40-a99d6f LoadLibraryExW 525->528 527->528 529 a99d78-a99d95 528->529 530 a99d71-a99d77 528->530 530->529
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A99B51,00000800,00000000,00000000), ref: 00A99D62
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: fc8d972e4fdec4914d1acb5ef0015e6cc8376cf4504b533da4cc2e8d16301c7f
                              • Instruction ID: b33f1ed0a7618a3fee24de15e1c428bf6cde0dc466dccb0599b9bde72a1e9b1d
                              • Opcode Fuzzy Hash: fc8d972e4fdec4914d1acb5ef0015e6cc8376cf4504b533da4cc2e8d16301c7f
                              • Instruction Fuzzy Hash: 9311C2B69002099FDF10CF9AC584AEEFBF4AB98724F14842ED515B7210C775A945CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 533 6e77bd8-6e77c53 VirtualAllocEx 536 6e77c55-6e77c5b 533->536 537 6e77c5c-6e77c81 533->537 536->537
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E77C46
                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 26f51883888387ef572f373f589e1239e10c30a9da02536382def7b63d4f53a0
                              • Instruction ID: e719d87bfd4a5626456da84a81a06965aa820019c948534158bbce31049bc706
                              • Opcode Fuzzy Hash: 26f51883888387ef572f373f589e1239e10c30a9da02536382def7b63d4f53a0
                              • Instruction Fuzzy Hash: E11126719003099FCF10DFA9C9447DFBBF5AB88324F148419E515A7250C775A945CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 7f69c1934313ed1e066577acbbd589d7d8dc280525be6488e35739771f017a57
                              • Instruction ID: c9e4427708c436a8c95a7253e7d25e8b715babbc23ad4f0cb642c4c71badc9ac
                              • Opcode Fuzzy Hash: 7f69c1934313ed1e066577acbbd589d7d8dc280525be6488e35739771f017a57
                              • Instruction Fuzzy Hash: 69112871D003488FCB10DFAAC4447EFFBF5AB98224F15841AD519B7250CB75A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00A99AD6
                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 3b92911a54ccc7c3939fbe017c7840e33f2152f9ffe02229db736e24a6394d03
                              • Instruction ID: c8b46908ec875e1c22970eae233d270ab9d2f975dc4576d44f5846bcded93d1e
                              • Opcode Fuzzy Hash: 3b92911a54ccc7c3939fbe017c7840e33f2152f9ffe02229db736e24a6394d03
                              • Instruction Fuzzy Hash: 4D11DFB5D002499FDB10CF9AC544BDEFBF4EB89324F14841AD429B7610D379A946CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PostMessageW.USER32(?,?,?,?), ref: 07048B3D
                              Memory Dump Source
                              • Source File: 00000000.00000002.285404156.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7040000_Bank Details.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 07284f23bf45a9d0e7a8b3c62e846511553256dfff3ba378deb167721d10b7dc
                              • Instruction ID: 4261ed72266176adb6bf66e30843c323b7c39d65e12af5da3b515f9c1d658076
                              • Opcode Fuzzy Hash: 07284f23bf45a9d0e7a8b3c62e846511553256dfff3ba378deb167721d10b7dc
                              • Instruction Fuzzy Hash: D011D0B58003499FDB10CF99D989BDEBBF8EB48324F10891AE955A7250C375A984CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279805414.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9fd000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ba0ec3ce2e898b816d80b6d4f3de16a605480a0943288ff8bbbb6132bda9bfd5
                              • Instruction ID: 9e493ee9e9154e6b98bef598f6c5b74fd9eb4efe82d0ef8c8aca39acbb235c05
                              • Opcode Fuzzy Hash: ba0ec3ce2e898b816d80b6d4f3de16a605480a0943288ff8bbbb6132bda9bfd5
                              • Instruction Fuzzy Hash: DD213AB1504248DFDB01DF14D9C0B36BF66FB84328F24C969EA054B25AC336D855DBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279851688.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a0d000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d8dc7edf30224c68570603a6aacaa4b6015a321d7dd41b1a3753932584f41e36
                              • Instruction ID: 58158a185a7a21efa6521b19a73a98848e98e9c7ba99b71fdd9b0251fc766f15
                              • Opcode Fuzzy Hash: d8dc7edf30224c68570603a6aacaa4b6015a321d7dd41b1a3753932584f41e36
                              • Instruction Fuzzy Hash: 192107B2504248EFDB01DF94E5C4B66BBA5FB88314F24C9ADE9094B286C736D846CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279851688.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a0d000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f0dba43f26ba65e96438f7e351063a5e2af6ed136b992540b1d3ec576970dd14
                              • Instruction ID: c7338ea5f15f29aa603b096703091e0fd3a3d617ebb039a3facd9181804609d0
                              • Opcode Fuzzy Hash: f0dba43f26ba65e96438f7e351063a5e2af6ed136b992540b1d3ec576970dd14
                              • Instruction Fuzzy Hash: 9621F576504248EFDB14CF64E9C4B26BB65FB84324F24C9A9D90E4B286C336D846CA62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279851688.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a0d000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 22c67fbfd7e8db784fd0df18c3f64a4ed643e2eb595bcb2df733a5fac27e3320
                              • Instruction ID: 8717c35b557a73d2dd62dfadfcf30c90c57464865b01332b46bf9b3f43908696
                              • Opcode Fuzzy Hash: 22c67fbfd7e8db784fd0df18c3f64a4ed643e2eb595bcb2df733a5fac27e3320
                              • Instruction Fuzzy Hash: 4521C3765093C48FCB12CF20D990B15BF71EB46314F28C5DAD8498B697C33AD80ACB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279805414.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9fd000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd11a6915065f88f4dc5ee675cdba5aa4dd08ecf0b3a926c3046c5ef60737c16
                              • Instruction ID: 6e95a72d99d3f77fbf4ce3bd39a71876b9511b62369741e07e5759d30b0fa3de
                              • Opcode Fuzzy Hash: dd11a6915065f88f4dc5ee675cdba5aa4dd08ecf0b3a926c3046c5ef60737c16
                              • Instruction Fuzzy Hash: 7E11E676405284CFDF11CF10D5C4B26BF72FB84324F24C6A9E9450B65AC336D85ACBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279851688.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a0d000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 486825640ab96ba3e39a8b38934c490916e905c8cff2a83d251abf765d7060b2
                              • Instruction ID: 74e1d57284c78f560898675d1d03d9bbd5caa0c515157e88080c6b63988b45b9
                              • Opcode Fuzzy Hash: 486825640ab96ba3e39a8b38934c490916e905c8cff2a83d251abf765d7060b2
                              • Instruction Fuzzy Hash: 6111BB76904284DFCB11CF54D5C0B55BBB1FB88324F28C6ADD8494B696C33AD84ACB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279805414.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9fd000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 599f49a52d664344aaf892cb37d6e760bf77e11eba2a361fc0423e029c62ba2b
                              • Instruction ID: 5c8721f7ed8d496ad30e117924977c1ce24db8b2a0bbe9f9b71a453a73266719
                              • Opcode Fuzzy Hash: 599f49a52d664344aaf892cb37d6e760bf77e11eba2a361fc0423e029c62ba2b
                              • Instruction Fuzzy Hash: 9501F7B10093489AE7106E26CD84B76BBDCEF41338F18855AEB045F246D7799840CBB2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279805414.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9fd000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 430f9d75a28762fdc4dbeb3a9053f9953fc2bb175ebc187078543ec8b4bd9303
                              • Instruction ID: cbb53f1d7041573e1918873765fc96140ab405b07954cd3321095c0c5f5cfe90
                              • Opcode Fuzzy Hash: 430f9d75a28762fdc4dbeb3a9053f9953fc2bb175ebc187078543ec8b4bd9303
                              • Instruction Fuzzy Hash: A9F04FB14052489EEB109E16DD84B72FB9CEB51734F18C45AEE085A286C3799C44CBB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID: M
                              • API String ID: 0-3664761504
                              • Opcode ID: 1b7f1ed925c9a86235fe83c487b7bc1fb310c42f046cac78dc4001f099519fad
                              • Instruction ID: 3e644f3c2c2fe0019214c2f84364ffdde3ef5843b9ddc5a683faa874ebe1c619
                              • Opcode Fuzzy Hash: 1b7f1ed925c9a86235fe83c487b7bc1fb310c42f046cac78dc4001f099519fad
                              • Instruction Fuzzy Hash: DE414571E05A588BEB5CCF6BCD4069EFAF3AFC9201F14C1BA850CAA259DB3045858F51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.285404156.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7040000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID: #
                              • API String ID: 0-1885708031
                              • Opcode ID: f260a6f2b292bad01127eea2d41d057cef137cd945d0f9d5bc19a8e1443a4c0c
                              • Instruction ID: 51f6cabeed0a56db2a8522396ec5e0cc5ef47d3b73b2004f3e0ebd120e98cb8d
                              • Opcode Fuzzy Hash: f260a6f2b292bad01127eea2d41d057cef137cd945d0f9d5bc19a8e1443a4c0c
                              • Instruction Fuzzy Hash: 6F4150B1D05A588BEB68CF6BCC4478EFAF3AFC9201F14C1F9851CA6254EB300A818F01
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b8389d67f8233833bda22aacc459ab5451e157050b55a8ca3d96ed80bc68c6a
                              • Instruction ID: 802a4cc69c73c4624317bc5d3343493c22d70eb4486cba066cfc848ca65773f0
                              • Opcode Fuzzy Hash: 9b8389d67f8233833bda22aacc459ab5451e157050b55a8ca3d96ed80bc68c6a
                              • Instruction Fuzzy Hash: 501291B1611B469BD310CF65ED983AD3BA1B74632CB90C308D2612FAF1D7B4194AEF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b2ab270a662cd6ab6d32ef49fc584f7fff7c7dc6f5b5c50c826a2289f35cb3d7
                              • Instruction ID: fa8d94bddb10365ae1999eb2a3c4a8e106fc9f6c010e26f0ded92abe21b6bc1e
                              • Opcode Fuzzy Hash: b2ab270a662cd6ab6d32ef49fc584f7fff7c7dc6f5b5c50c826a2289f35cb3d7
                              • Instruction Fuzzy Hash: 47A16936F0061A8FCF05DFA5C94499EBBF2FF85300B15856AE805BB261EB31A955CF80
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.279982529.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d71b0a9fb8fff2a6e70e796ec8ce12b2f4c3de69406d32ad9a588746d91771f0
                              • Instruction ID: 460000fbc7ff66087ef5940f9eada951476b724e4cf8e25c428a971a6a74f8e8
                              • Opcode Fuzzy Hash: d71b0a9fb8fff2a6e70e796ec8ce12b2f4c3de69406d32ad9a588746d91771f0
                              • Instruction Fuzzy Hash: 30C105B1A11B468BD710CF65EC8839D3BB1BB8632CF508308D2612FAE1D7B4194ADF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d41a6ce67b9f4db5e63c0c9cb15e878d7ee1dbef06e5c0c05072aed536b20ea9
                              • Instruction ID: 7fb8105fabebee5cbe415a1fbb37c57ce4eb0c3c8d2c0b5e09c1f2e2407fb60e
                              • Opcode Fuzzy Hash: d41a6ce67b9f4db5e63c0c9cb15e878d7ee1dbef06e5c0c05072aed536b20ea9
                              • Instruction Fuzzy Hash: F741BE650262C16EB7C99D775C058F76BD9C5DE52AF142E74E893C3082F71628438EE2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.285122738.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e70000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 41de78c53f9e2a171f3822722f0be71cdfbd770af04e0564c9a4584b183800e9
                              • Instruction ID: a4f4a3f1b76fb20b7e3bb1369d05ae1bfd98deac5ed4e4748ff2e7e9795a9b33
                              • Opcode Fuzzy Hash: 41de78c53f9e2a171f3822722f0be71cdfbd770af04e0564c9a4584b183800e9
                              • Instruction Fuzzy Hash: D8516171E05A548FE75DCF6B8C4069AFAF3AFC9211F19C1BA844CAB265EB340946CF11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.285404156.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7040000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 43cbccbfeae1acf96f0c9517cfcee55e2d6e1a10db1060c37dd9e5870cd80b64
                              • Instruction ID: b1b44e57772cf27a1791a52d989a412ffb294a49899e890449187745c664c2ca
                              • Opcode Fuzzy Hash: 43cbccbfeae1acf96f0c9517cfcee55e2d6e1a10db1060c37dd9e5870cd80b64
                              • Instruction Fuzzy Hash: E5414FB1D05B548BE75DCF6B9C4068AFBF3AFC9211F14C1FAC41CAA265EA3405868F11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:12%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:382
                              Total number of Limit Nodes:24
                              execution_graph 26777 28d6758 26779 28d6766 26777->26779 26780 28d6344 26777->26780 26781 28d634f 26780->26781 26784 28d6394 26781->26784 26783 28d688d 26783->26779 26785 28d639f 26784->26785 26788 28d63c4 26785->26788 26787 28d6962 26787->26783 26789 28d63cf 26788->26789 26792 28d63f4 26789->26792 26791 28d6a62 26791->26787 26794 28d63ff 26792->26794 26793 28d71bc 26793->26791 26794->26793 26796 28db407 26794->26796 26797 28db429 26796->26797 26798 28db44d 26797->26798 26802 28db5b8 26797->26802 26806 28db5a9 26797->26806 26810 28db587 26797->26810 26798->26793 26803 28db5c5 26802->26803 26804 28db5ff 26803->26804 26815 28da0ec 26803->26815 26804->26798 26807 28db5c5 26806->26807 26808 28db5ff 26807->26808 26809 28da0ec 6 API calls 26807->26809 26808->26798 26809->26808 26811 28db58b 26810->26811 26812 28db5d3 26810->26812 26811->26798 26813 28db5ff 26812->26813 26814 28da0ec 6 API calls 26812->26814 26813->26798 26814->26813 26816 28da0f7 26815->26816 26818 28dc2f8 26816->26818 26819 28db904 26816->26819 26818->26818 26820 28db90f 26819->26820 26821 28dc367 26820->26821 26822 28d63f4 6 API calls 26820->26822 26823 28dc375 26821->26823 26829 28dc3e0 26821->26829 26835 28dc3d3 26821->26835 26822->26821 26841 28de0d8 26823->26841 26849 28de0f0 26823->26849 26824 28dc3a0 26824->26818 26830 28dc40e 26829->26830 26832 28dc437 26830->26832 26834 28dc4df 26830->26834 26858 28db9a0 26830->26858 26833 28dc4da KiUserCallbackDispatcher 26832->26833 26832->26834 26833->26834 26836 28dc40e 26835->26836 26837 28db9a0 GetFocus 26836->26837 26838 28dc437 26836->26838 26840 28dc4df 26836->26840 26837->26838 26839 28dc4da KiUserCallbackDispatcher 26838->26839 26838->26840 26839->26840 26842 28de0f0 26841->26842 26843 28de16e 26842->26843 26844 28de12d 26842->26844 26862 28de428 26842->26862 26865 28de438 26842->26865 26868 28dedef 26843->26868 26872 28dee00 26843->26872 26844->26824 26851 28de121 26849->26851 26853 28de213 26849->26853 26850 28de12d 26850->26824 26851->26850 26852 28de16e 26851->26852 26856 28de428 2 API calls 26851->26856 26857 28de438 2 API calls 26851->26857 26854 28dedef CreateWindowExW 26852->26854 26855 28dee00 CreateWindowExW 26852->26855 26853->26824 26854->26853 26855->26853 26856->26852 26857->26852 26859 28db9ab 26858->26859 26860 28dba14 GetFocus 26859->26860 26861 28dc9f5 26859->26861 26860->26861 26861->26832 26863 28d93e8 LoadLibraryExW GetModuleHandleW 26862->26863 26864 28de441 26863->26864 26864->26843 26866 28d93e8 LoadLibraryExW GetModuleHandleW 26865->26866 26867 28de441 26865->26867 26866->26867 26867->26843 26869 28dee2a 26868->26869 26870 28deed1 26869->26870 26871 28dfaa0 CreateWindowExW 26869->26871 26871->26870 26873 28dee2a 26872->26873 26874 28deed1 26873->26874 26875 28dfaa0 CreateWindowExW 26873->26875 26875->26874 26502 5d85110 26503 5d8512a 26502->26503 26506 5d84850 26503->26506 26508 5d84856 26506->26508 26507 5d8487a 26508->26507 26512 5d8494f 26508->26512 26516 5d84ab7 26508->26516 26520 5d84960 26508->26520 26515 5d84953 26512->26515 26513 5d84aaf 26513->26507 26515->26513 26524 5d83838 26515->26524 26518 5d849f1 26516->26518 26517 5d84aaf 26517->26507 26518->26517 26519 5d83838 2 API calls 26518->26519 26519->26517 26522 5d84962 26520->26522 26521 5d84aaf 26521->26507 26522->26521 26523 5d83838 2 API calls 26522->26523 26523->26521 26525 5d83866 26524->26525 26529 5d838a5 26524->26529 26526 5d83897 26525->26526 26527 5d838aa 26525->26527 26528 5d8392d 26525->26528 26525->26529 26538 5d83b28 26526->26538 26546 5d83b19 26526->26546 26527->26529 26554 5d84b0f 26527->26554 26568 5d84b20 26527->26568 26582 5d84b1b 26527->26582 26528->26529 26532 5d8494f 2 API calls 26528->26532 26533 5d84960 2 API calls 26528->26533 26534 5d84ab7 2 API calls 26528->26534 26529->26513 26532->26529 26533->26529 26534->26529 26541 5d83b50 26538->26541 26539 5d83bca 26539->26529 26540 5d83bc0 26616 5d84ad8 26540->26616 26620 5d84ac8 26540->26620 26541->26539 26541->26540 26596 5d83c18 26541->26596 26605 5d83c08 26541->26605 26549 5d83b28 26546->26549 26547 5d83bca 26547->26529 26548 5d83bc0 26552 5d84ad8 2 API calls 26548->26552 26553 5d84ac8 2 API calls 26548->26553 26549->26547 26549->26548 26550 5d83c18 2 API calls 26549->26550 26551 5d83c08 2 API calls 26549->26551 26550->26548 26551->26548 26552->26547 26553->26547 26555 5d84b13 26554->26555 26557 5d84b4e 26555->26557 26558 5d84bfc 26555->26558 26559 5d84bf7 26555->26559 26556 5d84bae 26556->26559 26565 5d84b1b 2 API calls 26556->26565 26566 5d84b0f 2 API calls 26556->26566 26567 5d84b20 2 API calls 26556->26567 26557->26556 26707 5d84d70 26557->26707 26717 5d84d60 26557->26717 26558->26559 26562 5d84b1b 2 API calls 26558->26562 26563 5d84b0f 2 API calls 26558->26563 26564 5d84b20 2 API calls 26558->26564 26559->26529 26562->26559 26563->26559 26564->26559 26565->26559 26566->26559 26567->26559 26569 5d84b41 26568->26569 26572 5d84bf7 26568->26572 26570 5d84bfc 26569->26570 26571 5d84b4e 26569->26571 26570->26572 26576 5d84b1b 2 API calls 26570->26576 26577 5d84b0f 2 API calls 26570->26577 26578 5d84b20 2 API calls 26570->26578 26573 5d84bae 26571->26573 26574 5d84d70 2 API calls 26571->26574 26575 5d84d60 2 API calls 26571->26575 26572->26529 26573->26572 26579 5d84b1b 2 API calls 26573->26579 26580 5d84b0f 2 API calls 26573->26580 26581 5d84b20 2 API calls 26573->26581 26574->26573 26575->26573 26576->26572 26577->26572 26578->26572 26579->26572 26580->26572 26581->26572 26583 5d84b20 26582->26583 26585 5d84b4e 26583->26585 26586 5d84bfc 26583->26586 26587 5d84bf7 26583->26587 26584 5d84bae 26584->26587 26593 5d84b1b 2 API calls 26584->26593 26594 5d84b0f 2 API calls 26584->26594 26595 5d84b20 2 API calls 26584->26595 26585->26584 26588 5d84d70 2 API calls 26585->26588 26589 5d84d60 2 API calls 26585->26589 26586->26587 26590 5d84b1b 2 API calls 26586->26590 26591 5d84b0f 2 API calls 26586->26591 26592 5d84b20 2 API calls 26586->26592 26587->26529 26588->26584 26589->26584 26590->26587 26591->26587 26592->26587 26593->26587 26594->26587 26595->26587 26597 5d83d2e 26596->26597 26599 5d83c3c 26596->26599 26634 5d85cfb 26597->26634 26641 5d85cef 26597->26641 26648 5d85b58 26597->26648 26598 5d83cf4 26598->26540 26624 5d83dc8 26599->26624 26629 5d83dbb 26599->26629 26606 5d83c16 26605->26606 26609 5d83bd3 26605->26609 26607 5d83d2e 26606->26607 26610 5d83c3c 26606->26610 26611 5d85b58 2 API calls 26607->26611 26612 5d85cfb 2 API calls 26607->26612 26613 5d85cef 2 API calls 26607->26613 26608 5d83cf4 26608->26540 26609->26540 26614 5d83dc8 2 API calls 26610->26614 26615 5d83dbb 2 API calls 26610->26615 26611->26608 26612->26608 26613->26608 26614->26608 26615->26608 26617 5d84ae0 26616->26617 26618 5d83838 2 API calls 26617->26618 26619 5d84b08 26617->26619 26618->26619 26619->26539 26622 5d84acb 26620->26622 26621 5d84b08 26621->26539 26622->26621 26623 5d83838 2 API calls 26622->26623 26623->26621 26625 5d83dfc 26624->26625 26628 5d84850 2 API calls 26625->26628 26655 5d8482d 26625->26655 26626 5d83eaa 26626->26598 26628->26626 26630 5d83dfc 26629->26630 26632 5d8482d 2 API calls 26630->26632 26633 5d84850 2 API calls 26630->26633 26631 5d83eaa 26631->26598 26632->26631 26633->26631 26635 5d85c14 26634->26635 26636 5d85c24 26635->26636 26661 5d85e15 26635->26661 26666 5d85d6b 26635->26666 26637 5d85d25 26636->26637 26671 5d85a20 26636->26671 26637->26598 26642 5d85c14 26641->26642 26644 5d85c24 26641->26644 26642->26644 26646 5d85d6b 2 API calls 26642->26646 26647 5d85e15 2 API calls 26642->26647 26643 5d85a20 2 API calls 26643->26644 26644->26643 26645 5d85d25 26644->26645 26645->26598 26646->26644 26647->26644 26650 5d85b5b 26648->26650 26649 5d85c24 26651 5d85d25 26649->26651 26652 5d85a20 2 API calls 26649->26652 26650->26649 26653 5d85d6b 2 API calls 26650->26653 26654 5d85e15 2 API calls 26650->26654 26651->26598 26652->26649 26653->26649 26654->26649 26657 5d84847 26655->26657 26656 5d8487a 26656->26626 26657->26656 26658 5d8494f 2 API calls 26657->26658 26659 5d84960 2 API calls 26657->26659 26660 5d84ab7 2 API calls 26657->26660 26658->26656 26659->26656 26660->26656 26663 5d85df2 26661->26663 26662 5d85e5a 26662->26636 26663->26662 26676 5d85e98 26663->26676 26683 5d85e8b 26663->26683 26668 5d85d73 26666->26668 26667 5d85e5a 26667->26636 26668->26667 26669 5d85e98 2 API calls 26668->26669 26670 5d85e8b 2 API calls 26668->26670 26669->26668 26670->26668 26672 5d85a2a 26671->26672 26673 5d85a36 26672->26673 26674 5d83c18 2 API calls 26672->26674 26675 5d83c08 2 API calls 26672->26675 26673->26636 26674->26673 26675->26673 26678 5d85e9d 26676->26678 26677 5d85ea3 26677->26663 26678->26677 26690 5d85ed8 26678->26690 26694 5d85ed3 26678->26694 26698 5d85ec8 26678->26698 26679 5d85ebc 26679->26663 26685 5d85e98 26683->26685 26684 5d85ea3 26684->26663 26685->26684 26687 5d85ed8 2 API calls 26685->26687 26688 5d85ec8 2 API calls 26685->26688 26689 5d85ed3 2 API calls 26685->26689 26686 5d85ebc 26686->26663 26687->26686 26688->26686 26689->26686 26691 5d85ef1 26690->26691 26693 5d85ee3 26690->26693 26702 5d806c8 26691->26702 26693->26679 26695 5d85ed8 26694->26695 26696 5d806c8 2 API calls 26695->26696 26697 5d85ee3 26695->26697 26696->26697 26697->26679 26699 5d85ecb 26698->26699 26700 5d806c8 2 API calls 26699->26700 26701 5d85ee3 26699->26701 26700->26701 26701->26679 26703 5d806d8 26702->26703 26704 5d80745 26703->26704 26705 5d80998 GetCurrentThreadId GetCurrentThreadId 26703->26705 26706 5d8098b GetCurrentThreadId GetCurrentThreadId 26703->26706 26704->26693 26705->26704 26706->26704 26708 5d84d7a 26707->26708 26709 5d84dca 26708->26709 26710 5d84dcc 26708->26710 26711 5d84db0 26708->26711 26709->26556 26737 5d84ebf 26710->26737 26745 5d84e2b 26710->26745 26752 5d84e30 26710->26752 26727 5d85948 26711->26727 26732 5d85943 26711->26732 26718 5d84d63 26717->26718 26719 5d84dcc 26718->26719 26720 5d84db0 26718->26720 26721 5d84dca 26718->26721 26724 5d84e2b 2 API calls 26719->26724 26725 5d84ebf 2 API calls 26719->26725 26726 5d84e30 2 API calls 26719->26726 26722 5d85948 2 API calls 26720->26722 26723 5d85943 2 API calls 26720->26723 26721->26556 26722->26721 26723->26721 26724->26721 26725->26721 26726->26721 26728 5d85967 26727->26728 26729 5d85955 26727->26729 26728->26709 26729->26728 26730 5d85d6b 2 API calls 26729->26730 26731 5d85e15 2 API calls 26729->26731 26730->26728 26731->26728 26733 5d85948 26732->26733 26734 5d85967 26733->26734 26735 5d85d6b 2 API calls 26733->26735 26736 5d85e15 2 API calls 26733->26736 26734->26709 26735->26734 26736->26734 26738 5d84e4e 26737->26738 26739 5d84ec3 26737->26739 26738->26709 26741 5d84f1d 26739->26741 26759 5d84f98 26739->26759 26763 5d84fa3 26739->26763 26767 5d84fa8 26739->26767 26740 5d84f1a 26740->26709 26741->26709 26746 5d84e30 26745->26746 26747 5d84e4c 26746->26747 26748 5d84e59 26746->26748 26749 5d84e43 26746->26749 26747->26709 26748->26747 26771 5d855a8 26748->26771 26750 5d84ebf 2 API calls 26749->26750 26750->26747 26753 5d84e3c 26752->26753 26755 5d84e4c 26752->26755 26754 5d84e59 26753->26754 26753->26755 26756 5d84e43 26753->26756 26754->26755 26758 5d855a8 2 API calls 26754->26758 26755->26709 26757 5d84ebf 2 API calls 26756->26757 26757->26755 26758->26755 26760 5d84f9b 26759->26760 26761 5d84850 2 API calls 26760->26761 26762 5d8503b 26761->26762 26762->26740 26764 5d84fa8 26763->26764 26765 5d84850 2 API calls 26764->26765 26766 5d8503b 26765->26766 26766->26740 26768 5d84fd8 26767->26768 26769 5d84850 2 API calls 26768->26769 26770 5d8503b 26769->26770 26770->26740 26772 5d855b4 26771->26772 26773 5d855bd 26772->26773 26774 5d84850 2 API calls 26772->26774 26773->26747 26774->26773 26876 5d80c40 26877 5d80c4d 26876->26877 26878 5d80c51 26876->26878 26882 5d80ef8 26878->26882 26887 5d80eeb 26878->26887 26879 5d80c71 26883 5d80f00 26882->26883 26885 28dedef CreateWindowExW 26883->26885 26886 28dee00 CreateWindowExW 26883->26886 26884 5d80f1e 26884->26879 26885->26884 26886->26884 26888 5d80ef8 26887->26888 26890 28dedef CreateWindowExW 26888->26890 26891 28dee00 CreateWindowExW 26888->26891 26889 5d80f1e 26889->26879 26890->26889 26891->26889 26900 5d82bf0 26901 5d82bf9 26900->26901 26905 5d82c3b 26901->26905 26910 5d82c40 26901->26910 26902 5d82c2a 26906 5d82c40 26905->26906 26915 5d82cb0 26906->26915 26920 5d82ca4 26906->26920 26907 5d82c5c 26907->26902 26911 5d82c45 26910->26911 26913 5d82cb0 DnsQuery_A 26911->26913 26914 5d82ca4 DnsQuery_A 26911->26914 26912 5d82c5c 26912->26902 26913->26912 26914->26912 26916 5d82cce 26915->26916 26917 5d82cf6 26916->26917 26925 5d82db8 26916->26925 26929 5d82dab 26916->26929 26917->26907 26921 5d82cce 26920->26921 26922 5d82cf6 26921->26922 26923 5d82db8 DnsQuery_A 26921->26923 26924 5d82dab DnsQuery_A 26921->26924 26922->26907 26923->26921 26924->26921 26926 5d82de1 26925->26926 26933 5d8131c 26926->26933 26930 5d82db8 26929->26930 26931 5d8131c DnsQuery_A 26930->26931 26932 5d82e22 26931->26932 26932->26916 26934 5d83030 DnsQuery_A 26933->26934 26936 5d8316a 26934->26936 26775 28dbd00 DuplicateHandle 26776 28dbd96 26775->26776 26892 28db6d0 GetCurrentProcess 26893 28db74a GetCurrentThread 26892->26893 26894 28db743 26892->26894 26895 28db787 GetCurrentProcess 26893->26895 26896 28db780 26893->26896 26894->26893 26899 28db7bd 26895->26899 26896->26895 26897 28db7e5 GetCurrentThreadId 26898 28db816 26897->26898 26899->26897 26937 28d92f0 26938 28d92ff 26937->26938 26940 28d93e8 26937->26940 26941 28d93fb 26940->26941 26943 28d9413 26941->26943 26948 28d9660 26941->26948 26952 28d9670 26941->26952 26942 28d940b 26942->26943 26944 28d9610 GetModuleHandleW 26942->26944 26943->26938 26945 28d963d 26944->26945 26945->26938 26949 28d9684 26948->26949 26950 28d96a9 26949->26950 26956 28d8768 26949->26956 26950->26942 26953 28d9684 26952->26953 26954 28d96a9 26953->26954 26955 28d8768 LoadLibraryExW 26953->26955 26954->26942 26955->26954 26957 28d9850 LoadLibraryExW 26956->26957 26959 28d98c9 26957->26959 26959->26950
                              Memory Dump Source
                              • Source File: 00000008.00000002.502111089.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_5d80000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e190ffdc611fcfb8926d718d674cae7b1e9b5bf7e60b66714e728e4f545bd9cd
                              • Instruction ID: f2450209cc1e11d04b7be80b83caedeff4f94155020e5a5dbfa963005b0bdc3a
                              • Opcode Fuzzy Hash: e190ffdc611fcfb8926d718d674cae7b1e9b5bf7e60b66714e728e4f545bd9cd
                              • Instruction Fuzzy Hash: 22511374E05209DFDB00EFA4E995AEDBBB2FF49304F10806AE806AB364DB306945CF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.502111089.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_5d80000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a1dcbb516786017d5b06cbd62ad734db582d0bd7d7a10350813235f5b60220a0
                              • Instruction ID: 6ece104953841033b0a5f1bfa20ffe611c249c8dd1c4e72001b9ca2867349654
                              • Opcode Fuzzy Hash: a1dcbb516786017d5b06cbd62ad734db582d0bd7d7a10350813235f5b60220a0
                              • Instruction Fuzzy Hash: 4441B074E05209DFDB04EFA4D999AADBBF1FB49304F10802AE806A73A4DB346945CF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 135 28db6c0-28db741 GetCurrentProcess 136 28db74a-28db77e GetCurrentThread 135->136 137 28db743-28db749 135->137 138 28db787-28db7bb GetCurrentProcess 136->138 139 28db780-28db786 136->139 137->136 141 28db7bd-28db7c3 138->141 142 28db7c4-28db7df call 28dbc88 138->142 139->138 141->142 144 28db7e5-28db814 GetCurrentThreadId 142->144 146 28db81d-28db87f 144->146 147 28db816-28db81c 144->147 147->146
                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 028DB730
                              • GetCurrentThread.KERNEL32 ref: 028DB76D
                              • GetCurrentProcess.KERNEL32 ref: 028DB7AA
                              • GetCurrentThreadId.KERNEL32 ref: 028DB803
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: cd6a535ae4685df186ad6877fe2c101a9bb20074ed5e17b47596a6e63834f2c0
                              • Instruction ID: 9520977286c567b416af67247116b455301857c1377750893c3f01dedba9a386
                              • Opcode Fuzzy Hash: cd6a535ae4685df186ad6877fe2c101a9bb20074ed5e17b47596a6e63834f2c0
                              • Instruction Fuzzy Hash: C35147B89002498FDB10CFA9D6487AEBBF1FF48318F25849ED019A7360C7749844CF66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 154 28db6d0-28db741 GetCurrentProcess 155 28db74a-28db77e GetCurrentThread 154->155 156 28db743-28db749 154->156 157 28db787-28db7bb GetCurrentProcess 155->157 158 28db780-28db786 155->158 156->155 160 28db7bd-28db7c3 157->160 161 28db7c4-28db7df call 28dbc88 157->161 158->157 160->161 163 28db7e5-28db814 GetCurrentThreadId 161->163 165 28db81d-28db87f 163->165 166 28db816-28db81c 163->166 166->165
                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 028DB730
                              • GetCurrentThread.KERNEL32 ref: 028DB76D
                              • GetCurrentProcess.KERNEL32 ref: 028DB7AA
                              • GetCurrentThreadId.KERNEL32 ref: 028DB803
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: 92fb4989c23b4569d057695020c36a31ff9192ff233586c8fd4c4ce920373768
                              • Instruction ID: 3f50117a1184e69d9522a4ca9a134619acd6229c29ac0d1623da8ab420adec0c
                              • Opcode Fuzzy Hash: 92fb4989c23b4569d057695020c36a31ff9192ff233586c8fd4c4ce920373768
                              • Instruction Fuzzy Hash: AA5146B89002088FDB10CFA9C648BAEBBF1FF48318F21845EE119A7360D7749844CF66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 219 28dfaa0-28dfb60 220 28dfbc4-28dfbd6 219->220 221 28dfb62-28dfbc3 219->221 222 28dfbd8 call 28dda04 220->222 223 28dfbe0-28dfc5e 220->223 221->220 228 28dfbdd-28dfbde 222->228 226 28dfc69-28dfc70 223->226 227 28dfc60-28dfc66 223->227 229 28dfc7b-28dfd1a CreateWindowExW 226->229 230 28dfc72-28dfc78 226->230 227->226 232 28dfd1c-28dfd22 229->232 233 28dfd23-28dfd5b 229->233 230->229 232->233 237 28dfd5d-28dfd60 233->237 238 28dfd68 233->238 237->238 239 28dfd69 238->239 239->239
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 028DFD0A
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: 5ef0252d0c60fa9136598f800d1d7fa2763f8334f9fbdb9143ebe64157102ca9
                              • Instruction ID: 1266a1e127bb5bda35bacd6f73089678ba213237c0d71b47ce05728b03a75f20
                              • Opcode Fuzzy Hash: 5ef0252d0c60fa9136598f800d1d7fa2763f8334f9fbdb9143ebe64157102ca9
                              • Instruction Fuzzy Hash: FA918A75C083899FCB16CFA9C8949C9BFB1FF0A314F1A819AE444AB262D7345859DF11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 240 28d93e8-28d93fd call 28d8704 243 28d93ff 240->243 244 28d9413-28d9417 240->244 295 28d9405 call 28d9660 243->295 296 28d9405 call 28d9670 243->296 245 28d9419-28d9423 244->245 246 28d942b-28d946c 244->246 245->246 251 28d946e-28d9476 246->251 252 28d9479-28d9487 246->252 247 28d940b-28d940d 247->244 249 28d9548-28d9608 247->249 288 28d960a-28d960d 249->288 289 28d9610-28d963b GetModuleHandleW 249->289 251->252 254 28d9489-28d948e 252->254 255 28d94ab-28d94ad 252->255 256 28d9499 254->256 257 28d9490-28d9497 call 28d8710 254->257 258 28d94b0-28d94b7 255->258 261 28d949b-28d94a9 256->261 257->261 262 28d94b9-28d94c1 258->262 263 28d94c4-28d94cb 258->263 261->258 262->263 265 28d94cd-28d94d5 263->265 266 28d94d8-28d94e1 call 28d8720 263->266 265->266 270 28d94ee-28d94f3 266->270 271 28d94e3-28d94eb 266->271 273 28d94f5-28d94fc 270->273 274 28d9511-28d9515 270->274 271->270 273->274 275 28d94fe-28d950e call 28d8730 call 28d8740 273->275 293 28d9518 call 28d9958 274->293 294 28d9518 call 28d9968 274->294 275->274 278 28d951b-28d951e 281 28d9541-28d9547 278->281 282 28d9520-28d953e 278->282 282->281 288->289 290 28d963d-28d9643 289->290 291 28d9644-28d9658 289->291 290->291 293->278 294->278 295->247 296->247
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 028D962E
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 8fbf74ec5e697135b56bf4e74245a096c8d559f104a5d51f15f486f9f08d4e4d
                              • Instruction ID: a5e32d95d9a696a085b1429a32861a6149f48eff001690ea00e46acfcf4212e2
                              • Opcode Fuzzy Hash: 8fbf74ec5e697135b56bf4e74245a096c8d559f104a5d51f15f486f9f08d4e4d
                              • Instruction Fuzzy Hash: 03712478A00B058FD724DF2AD44475AB7F2BF88318F008A6DD48AD7A50DB34E84ACF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 297 5d8131c-5d830a3 300 5d830dc-5d83168 DnsQuery_A 297->300 301 5d830a5-5d830af 297->301 310 5d8316a-5d83170 300->310 311 5d83171-5d831be 300->311 301->300 302 5d830b1-5d830b3 301->302 303 5d830b5-5d830bf 302->303 304 5d830d6-5d830d9 302->304 306 5d830c1 303->306 307 5d830c3-5d830d2 303->307 304->300 306->307 307->307 309 5d830d4 307->309 309->304 310->311 316 5d831ce-5d831d2 311->316 317 5d831c0-5d831c4 311->317 319 5d831e1-5d831e5 316->319 320 5d831d4-5d831d7 316->320 317->316 318 5d831c6 317->318 318->316 321 5d831f6 319->321 322 5d831e7-5d831f3 319->322 320->319 324 5d831f7 321->324 322->321 324->324
                              APIs
                              • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 05D83158
                              Memory Dump Source
                              • Source File: 00000008.00000002.502111089.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_5d80000_Bank Details.jbxd
                              Similarity
                              • API ID: Query_
                              • String ID:
                              • API String ID: 428220571-0
                              • Opcode ID: 741ea58cb3c6d028c097c2024a78bef2bd05e358206a807dcb35e4a08dd18e1e
                              • Instruction ID: ae97dadd5b718c65c10f136147962ff8ad7f4454a7bdab0a85ca9f4ba6129033
                              • Opcode Fuzzy Hash: 741ea58cb3c6d028c097c2024a78bef2bd05e358206a807dcb35e4a08dd18e1e
                              • Instruction Fuzzy Hash: A1512570D042189FDF10DFA9C984AEEBBB1FF48714F14852AE819AB250DB74A846CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 325 5d83027-5d830a3 327 5d830dc-5d8310f 325->327 328 5d830a5-5d830af 325->328 335 5d83117-5d83168 DnsQuery_A 327->335 328->327 329 5d830b1-5d830b3 328->329 330 5d830b5-5d830bf 329->330 331 5d830d6-5d830d9 329->331 333 5d830c1 330->333 334 5d830c3-5d830d2 330->334 331->327 333->334 334->334 336 5d830d4 334->336 337 5d8316a-5d83170 335->337 338 5d83171-5d831be 335->338 336->331 337->338 343 5d831ce-5d831d2 338->343 344 5d831c0-5d831c4 338->344 346 5d831e1-5d831e5 343->346 347 5d831d4-5d831d7 343->347 344->343 345 5d831c6 344->345 345->343 348 5d831f6 346->348 349 5d831e7-5d831f3 346->349 347->346 351 5d831f7 348->351 349->348 351->351
                              APIs
                              • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 05D83158
                              Memory Dump Source
                              • Source File: 00000008.00000002.502111089.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_5d80000_Bank Details.jbxd
                              Similarity
                              • API ID: Query_
                              • String ID:
                              • API String ID: 428220571-0
                              • Opcode ID: 44301a1c00e8c78108c1be60cd856a1571f23cf56636dc1a092bc86f13599f14
                              • Instruction ID: d1abe53a6dcc464315d1ffdcfa796d7c701cb99f6aa932e4b73cb1fbf004976c
                              • Opcode Fuzzy Hash: 44301a1c00e8c78108c1be60cd856a1571f23cf56636dc1a092bc86f13599f14
                              • Instruction Fuzzy Hash: E7513471D002099FDF10DFA9C984AEEFBB1FF48704F14852AE819AB250DB74A846CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 352 28dfbf8-28dfc5e 353 28dfc69-28dfc70 352->353 354 28dfc60-28dfc66 352->354 355 28dfc7b-28dfcb3 353->355 356 28dfc72-28dfc78 353->356 354->353 357 28dfcbb-28dfd1a CreateWindowExW 355->357 356->355 358 28dfd1c-28dfd22 357->358 359 28dfd23-28dfd5b 357->359 358->359 363 28dfd5d-28dfd60 359->363 364 28dfd68 359->364 363->364 365 28dfd69 364->365 365->365
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 028DFD0A
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: 5c03ed60793fb10ec7445f02aa547549ac0938acc4a8f260700050df5422f922
                              • Instruction ID: 06b4be7d6da9d7137b06577f8d7674f560a86398521c694055f711cdf11a275f
                              • Opcode Fuzzy Hash: 5c03ed60793fb10ec7445f02aa547549ac0938acc4a8f260700050df5422f922
                              • Instruction Fuzzy Hash: 1141CEB5D003089FDB14CF99C984ADEFBB5FF48314F24852AE919AB250D774A889CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 366 5d80a70-5d80adc 370 5d80ae9-5d80afd 366->370 371 5d80ade-5d80ae7 366->371 376 5d80b19-5d80b23 370->376 377 5d80aff-5d80b17 370->377 374 5d80b25-5d80b27 371->374 378 5d80b2f-5d80b5d GetCurrentThreadId 374->378 376->374 379 5d80b8d-5d80b91 377->379 380 5d80b5f-5d80b65 378->380 381 5d80b66-5d80b8b 378->381 382 5d80b9c 379->382 383 5d80b93 379->383 380->381 381->379 386 5d80b9d 382->386 383->382 386->386
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 05D80B49
                              Memory Dump Source
                              • Source File: 00000008.00000002.502111089.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_5d80000_Bank Details.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: 1d850cbd5ced240eca743bd4fe6a67416c17ca186a99b2fec5494b235798145c
                              • Instruction ID: 0e83fd0eb7c080bdb699c42521ec91fdcb8ec4c0e66a48c5f9c45d78d5c56535
                              • Opcode Fuzzy Hash: 1d850cbd5ced240eca743bd4fe6a67416c17ca186a99b2fec5494b235798145c
                              • Instruction Fuzzy Hash: 70317074A00218DFDB14EF69D448BAEBBF5EF48714F14805AE406A7390CB74A849CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 387 5d80a67-5d80adc 391 5d80ae9-5d80afd 387->391 392 5d80ade-5d80ae7 387->392 397 5d80b19-5d80b23 391->397 398 5d80aff-5d80b17 391->398 395 5d80b25-5d80b27 392->395 399 5d80b2f-5d80b5d GetCurrentThreadId 395->399 397->395 400 5d80b8d-5d80b91 398->400 401 5d80b5f-5d80b65 399->401 402 5d80b66-5d80b8b 399->402 403 5d80b9c 400->403 404 5d80b93 400->404 401->402 402->400 407 5d80b9d 403->407 404->403 407->407
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 05D80B49
                              Memory Dump Source
                              • Source File: 00000008.00000002.502111089.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_5d80000_Bank Details.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: a39caba887a3dd2519119e362b1c2d552887506f135718246f846b1e73e243b9
                              • Instruction ID: 2c31e6d12d6dc011695b60b99fa5efa26a533e91089479e8f6244691843588da
                              • Opcode Fuzzy Hash: a39caba887a3dd2519119e362b1c2d552887506f135718246f846b1e73e243b9
                              • Instruction Fuzzy Hash: 523178759002189FDB24EFA8D488BAEBBF5AF48714F18845EE406B7390CB74A849CF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 408 28dfe03-28dfe17 409 28dfe1d-28dfe1f 408->409 410 28dfe19-28dfe1b 408->410 411 28dfe25 409->411 412 28dfe21-28dfe23 call 28dda3c 409->412 410->409 418 28dfe27 call 28dfe40 411->418 419 28dfe27 call 28dfe03 411->419 412->411 414 28dfe28-28dfeaa SetWindowLongW 415 28dfeac-28dfeb2 414->415 416 28dfeb3-28dfec7 414->416 415->416 418->414 419->414
                              APIs
                              • SetWindowLongW.USER32(?,?,?), ref: 028DFE9D
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID:
                              • API String ID: 1378638983-0
                              • Opcode ID: 1da8d46287c59821ccaee31d4128b369a1dde99b7345e89ce1fa97321243ce16
                              • Instruction ID: 1732a87c215ff7c679f228b8b3f4e2361f481cafd0cebed4b954dc4ef00f9c11
                              • Opcode Fuzzy Hash: 1da8d46287c59821ccaee31d4128b369a1dde99b7345e89ce1fa97321243ce16
                              • Instruction Fuzzy Hash: DF219C79804248DFCB11CFA8E584BCEBBF4FF49324F05844AD948AB252C735A908CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 420 28dbcf9-28dbd94 DuplicateHandle 421 28dbd9d-28dbdba 420->421 422 28dbd96-28dbd9c 420->422 422->421
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 028DBD87
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: f18611541203899ec6bb377621c5e44aafeeb08cfed961de2d650083cf1f439e
                              • Instruction ID: f1fad67bcd2685ba312b283a5d1a9206cf8677b3128912114a681abe07c46521
                              • Opcode Fuzzy Hash: f18611541203899ec6bb377621c5e44aafeeb08cfed961de2d650083cf1f439e
                              • Instruction Fuzzy Hash: A321E2B9900208DFDF10CFA9D584ADEFBF5FB48324F15841AE958A3250D778A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 425 28dbd00-28dbd94 DuplicateHandle 426 28dbd9d-28dbdba 425->426 427 28dbd96-28dbd9c 425->427 427->426
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 028DBD87
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 2400bea5db9be4aeea80eb585637b7f15e8f9cbcf798a1f49f0041ebe4775123
                              • Instruction ID: 1d517c11d2aefa63ed1ec1c4057819364ea4441db1aab64ea4dee60356db9bf8
                              • Opcode Fuzzy Hash: 2400bea5db9be4aeea80eb585637b7f15e8f9cbcf798a1f49f0041ebe4775123
                              • Instruction Fuzzy Hash: 0B21C4B99002089FDB10CF9AD584ADEFBF4EB48324F15845AE958A3350D378A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,028D96A9,00000800,00000000,00000000), ref: 028D98BA
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 07fd72066c96ed69de33312156ff40767d6ea9b5dc8fa81f1599ebf3ad659cef
                              • Instruction ID: 002affce4b0ae6a899f1be50306c59426b2e624ce67a68d6501477ca05b8d03a
                              • Opcode Fuzzy Hash: 07fd72066c96ed69de33312156ff40767d6ea9b5dc8fa81f1599ebf3ad659cef
                              • Instruction Fuzzy Hash: 801103BA9002499FDB10CF9AC544BDEFBF4EB48724F05842ED519B7600C375A949CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,028D96A9,00000800,00000000,00000000), ref: 028D98BA
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: ff65d5d05501efddbd3f21788d00ebae52f85e52afaf741d867bc7cabbd61739
                              • Instruction ID: aa3111e79f5d300a0dec2193777c0472bf3e1d0df02bad444c5134e7a6e5f865
                              • Opcode Fuzzy Hash: ff65d5d05501efddbd3f21788d00ebae52f85e52afaf741d867bc7cabbd61739
                              • Instruction Fuzzy Hash: D11112BAD00209CFCB10CF9AD544BDEFBF4AB88328F15842ED959A7600C774A549CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 028D962E
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 3cb0026da22a4da3c8bc588658085e853f8b0a015a9f01470e68f17014bd3f9e
                              • Instruction ID: cbad46c4dcfd2b7217c45f3c2e3278eae2c7624689f4846843b5b8eec307a6b9
                              • Opcode Fuzzy Hash: 3cb0026da22a4da3c8bc588658085e853f8b0a015a9f01470e68f17014bd3f9e
                              • Instruction Fuzzy Hash: 3C1110B9C002498FCB20CF9AD544BDEFBF4EB88224F15845AD419B7200D378A549CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetWindowLongW.USER32(?,?,?), ref: 028DFE9D
                              Memory Dump Source
                              • Source File: 00000008.00000002.496862650.00000000028D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_28d0000_Bank Details.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID:
                              • API String ID: 1378638983-0
                              • Opcode ID: 1498ed1d84441a8e5690ec9f197560070e10a7f3b1f68752a284583b1557d6fe
                              • Instruction ID: adfe431ac2f6e52affb69f3e89de4eddf405ec4f326d150375b7e2b36743584b
                              • Opcode Fuzzy Hash: 1498ed1d84441a8e5690ec9f197560070e10a7f3b1f68752a284583b1557d6fe
                              • Instruction Fuzzy Hash: 3411E2B99002499FDB20CF99D589BDFFBF8EB48324F10845AD919A7741C374A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2850f0d6b3bcaf505e3f6e216c5de598870b3baa2839830ceca44f60284f2f2d
                              • Instruction ID: 356a5df927a37b7a5d7e9086de8a80dfdc85c12c13c4e62d3a7e7b2869eae14c
                              • Opcode Fuzzy Hash: 2850f0d6b3bcaf505e3f6e216c5de598870b3baa2839830ceca44f60284f2f2d
                              • Instruction Fuzzy Hash: 0831C135314510CFC7149B38E458AA977E6EF8A719B1580ADE10ACB7A2CF72DC06CB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ce0d1b77691361ed41d1556b51749bc5d040692b677c3536fed841792d472254
                              • Instruction ID: e0c2ce78eeda9dca94f03dd592ea738a124d5321a9b14b70d6f96d14f070aeb3
                              • Opcode Fuzzy Hash: ce0d1b77691361ed41d1556b51749bc5d040692b677c3536fed841792d472254
                              • Instruction Fuzzy Hash: B2018432B10A21DBCB39DA68D840A5B73EA9F88625314863ED809DB758DF71EC43C7D4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 27fb5989a3fea901fa3623e604af33c2712c0f735eeb0dcde5d27e937e11ac30
                              • Instruction ID: 357fab6a9c3924ed2e80c65ee761f8f224b09fdeb486e3a0bb3aac3df8909ccd
                              • Opcode Fuzzy Hash: 27fb5989a3fea901fa3623e604af33c2712c0f735eeb0dcde5d27e937e11ac30
                              • Instruction Fuzzy Hash: 42012F613180855FD704A27A281836ED9CBDBD8710F15C03EA20BC33C5CE659C0242A7
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d2d99004e40f872b9717cd7864fa1833560015d9e0ebd14d98ed10f3d38d3bda
                              • Instruction ID: cbd62e1720a932fb7fb0ea8147336d4409e9234df3926cc7728dc89f1549b059
                              • Opcode Fuzzy Hash: d2d99004e40f872b9717cd7864fa1833560015d9e0ebd14d98ed10f3d38d3bda
                              • Instruction Fuzzy Hash: 1E01263231C7508FC3299B39986556E7BE2DFC3614345C5EBD10DCB792DE609D0A83A6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 84c975d51c48201f522ed3018c6702d34ed4bc84ec9aa94e53e4f1142e0046b6
                              • Instruction ID: 69cdc9a361bf4a0929061210830ed5b11220972a40c5706eef6d9c947a9f985c
                              • Opcode Fuzzy Hash: 84c975d51c48201f522ed3018c6702d34ed4bc84ec9aa94e53e4f1142e0046b6
                              • Instruction Fuzzy Hash: CFF02872F10A22CBC739CE78990475736D29F88225715863DD049D7798DF34E8428780
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bccfcbd67067c58e7066f9a4145f3d3497bae2d594b61521945f46622d09e446
                              • Instruction ID: d061e922aee450bb80fdc9411aa3e786d49d14c9502cb7fe59f0b7a692559218
                              • Opcode Fuzzy Hash: bccfcbd67067c58e7066f9a4145f3d3497bae2d594b61521945f46622d09e446
                              • Instruction Fuzzy Hash: 07F0E576714715AB8324AA2EE88484ABBF9EFC96253448A6AF51DC7351DA70AC0843A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 43ce0ec5fa55c2c1b622785beeb211f638422da45ec4b836d0c2900fb398f5c4
                              • Instruction ID: b426e26846a953d846f5dba915c2423c12c2a47b4d058663e13dbe079d80939f
                              • Opcode Fuzzy Hash: 43ce0ec5fa55c2c1b622785beeb211f638422da45ec4b836d0c2900fb398f5c4
                              • Instruction Fuzzy Hash: 7CF06D79360510CFCF099B38D55D9983BA5EFC961675500A9E005CBBB1DB65C802CB10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6ada4c3ae4e22d4227a08742ebe35eabafb9e637b9d33376557f5bf3df69347a
                              • Instruction ID: 8630fd3055679ebbfeb9ae957ba0caffbaa641070a0cb88db9a2a65e9c00b1ae
                              • Opcode Fuzzy Hash: 6ada4c3ae4e22d4227a08742ebe35eabafb9e637b9d33376557f5bf3df69347a
                              • Instruction Fuzzy Hash: 32E0207BE00511CBC7145E74B68D66E7FA29F842137460355AC45C3BC4DE2CCE014790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 10a04d0b0473b4c4d259ee97ce63fc38b25b6d2d76b23d925cd892aac1d4b963
                              • Instruction ID: a14074ba660f80ad66e358c06db8629ef66335558147e2027d08ae654a8948c1
                              • Opcode Fuzzy Hash: 10a04d0b0473b4c4d259ee97ce63fc38b25b6d2d76b23d925cd892aac1d4b963
                              • Instruction Fuzzy Hash: 6BE0C23A610A20DB87146A24B4499AE77EA9F885217444369BC4A837C0DE28AE1183E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3175e5fc717c20c8576085d04220fa204181a62b235e50c71c07626caf683b71
                              • Instruction ID: fa6aa46d48dd922d8fbc24893eccb7a848d1e44798030f2aab08a6e3e1f6c4d2
                              • Opcode Fuzzy Hash: 3175e5fc717c20c8576085d04220fa204181a62b235e50c71c07626caf683b71
                              • Instruction Fuzzy Hash: 81E0DFB0C10206EDDB10AB68C94478EFF709B00269F288659C025FAB96D77601028B40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 458e59d6aadc839166bd27fecdd552f46d5130db6786e93d4acf40f2dab4060a
                              • Instruction ID: fcc84ad69968cadd77d5aada8b31f26970b9c355e3acf784904553a06f7bc7f3
                              • Opcode Fuzzy Hash: 458e59d6aadc839166bd27fecdd552f46d5130db6786e93d4acf40f2dab4060a
                              • Instruction Fuzzy Hash: 22E0ECB0D1421AEEDB80EFA9C91579EFBF0BB08204F108969C019E6241E7B556058F91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 821b62a9ce1ed87cc9ae2cddd99ab08c2b27c4648241557f9bd4e92946ea1a84
                              • Instruction ID: 87e115d57d43d14798a1bf89163cd36d8a519550db6e86c2d34c65c5e2c58ae8
                              • Opcode Fuzzy Hash: 821b62a9ce1ed87cc9ae2cddd99ab08c2b27c4648241557f9bd4e92946ea1a84
                              • Instruction Fuzzy Hash: 8FD0A76227C614EFCB18D7649C456B1779A839C713F45C165F009565C5CED1D5408144
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.503933746.0000000008220000.00000040.00000800.00020000.00000000.sdmp, Offset: 08220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_8220000_Bank Details.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 432fd53ba76bcb946292a673730ce846165a668cb64d7492ef35407aaac13c52
                              • Instruction ID: 6bbd6394f6970d09d66de15aeb7282d2c48ea9a26663d59b863d2e4dad71e4f3
                              • Opcode Fuzzy Hash: 432fd53ba76bcb946292a673730ce846165a668cb64d7492ef35407aaac13c52
                              • Instruction Fuzzy Hash: B3C08C3137C314EBCA1CE7156C40972739F93DCB26B00C520F00A1A1848FE268808094
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:11.3%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:234
                              Total number of Limit Nodes:6
                              execution_graph 18849 2d140d0 18850 2d140ec 18849->18850 18851 2d140fd 18850->18851 18855 2d14288 18850->18855 18860 2d1389c 18851->18860 18853 2d1411c 18856 2d142ad 18855->18856 18865 2d14388 18856->18865 18869 2d14378 18856->18869 18862 2d138a7 18860->18862 18861 2d16a61 18861->18853 18862->18861 18877 2d1568c 18862->18877 18864 2d16adb 18864->18853 18867 2d143af 18865->18867 18866 2d1448c 18866->18866 18867->18866 18873 2d13f88 18867->18873 18871 2d14382 18869->18871 18870 2d1448c 18870->18870 18871->18870 18872 2d13f88 CreateActCtxA 18871->18872 18872->18870 18874 2d15818 CreateActCtxA 18873->18874 18876 2d158db 18874->18876 18878 2d15697 18877->18878 18881 2d156bc 18878->18881 18880 2d16ca5 18880->18864 18882 2d156c7 18881->18882 18885 2d156ec 18882->18885 18884 2d16d82 18884->18880 18886 2d156f7 18885->18886 18889 2d1571c 18886->18889 18888 2d16e82 18888->18884 18890 2d15727 18889->18890 18892 2d1759e 18890->18892 18896 2d19760 18890->18896 18891 2d175dc 18891->18888 18892->18891 18900 2d1b4b0 18892->18900 18905 2d1b4c0 18892->18905 18910 2d19789 18896->18910 18914 2d19798 18896->18914 18897 2d19776 18897->18892 18901 2d1b4c0 18900->18901 18902 2d1b505 18901->18902 18937 2d1ba78 18901->18937 18941 2d1ba68 18901->18941 18902->18891 18906 2d1b4e1 18905->18906 18907 2d1b505 18906->18907 18908 2d1ba78 2 API calls 18906->18908 18909 2d1ba68 2 API calls 18906->18909 18907->18891 18908->18907 18909->18907 18911 2d19792 18910->18911 18917 2d19890 18911->18917 18912 2d197a7 18912->18897 18916 2d19890 2 API calls 18914->18916 18915 2d197a7 18915->18897 18916->18915 18918 2d198a3 18917->18918 18919 2d198bb 18918->18919 18925 2d19b09 18918->18925 18929 2d19b18 18918->18929 18919->18912 18920 2d198b3 18920->18919 18921 2d19ab8 GetModuleHandleW 18920->18921 18922 2d19ae5 18921->18922 18922->18912 18926 2d19b18 18925->18926 18927 2d19b51 18926->18927 18933 2d19288 18926->18933 18927->18920 18931 2d19b2c 18929->18931 18930 2d19b51 18930->18920 18931->18930 18932 2d19288 LoadLibraryExW 18931->18932 18932->18930 18934 2d19cf8 LoadLibraryExW 18933->18934 18936 2d19d71 18934->18936 18936->18927 18938 2d1ba85 18937->18938 18940 2d1babf 18938->18940 18945 2d1b89c 18938->18945 18940->18902 18943 2d1ba85 18941->18943 18942 2d1babf 18942->18902 18943->18942 18944 2d1b89c 2 API calls 18943->18944 18944->18942 18946 2d1b8a7 18945->18946 18948 2d1c3b0 18946->18948 18949 2d1b984 18946->18949 18948->18948 18950 2d1b98f 18949->18950 18951 2d1571c 2 API calls 18950->18951 18952 2d1c41f 18951->18952 18956 2d1e1a8 18952->18956 18962 2d1e190 18952->18962 18953 2d1c458 18953->18948 18958 2d1e1d9 18956->18958 18959 2d1e225 18956->18959 18957 2d1e1e5 18957->18953 18958->18957 18960 2d1e618 LoadLibraryExW GetModuleHandleW 18958->18960 18961 2d1e628 LoadLibraryExW GetModuleHandleW 18958->18961 18959->18953 18960->18959 18961->18959 18964 2d1e1a5 18962->18964 18963 2d1e1e5 18963->18953 18964->18963 18965 2d1e618 LoadLibraryExW GetModuleHandleW 18964->18965 18966 2d1e628 LoadLibraryExW GetModuleHandleW 18964->18966 18965->18963 18966->18963 18967 2d1bb90 18968 2d1bbf6 18967->18968 18972 2d1bd50 18968->18972 18975 2d1bd40 18968->18975 18969 2d1bca5 18979 2d1b924 18972->18979 18976 2d1bd50 18975->18976 18977 2d1b924 DuplicateHandle 18976->18977 18978 2d1bd7e 18977->18978 18978->18969 18980 2d1bdb8 DuplicateHandle 18979->18980 18981 2d1bd7e 18980->18981 18981->18969 18982 2d1ff10 18984 2d19760 2 API calls 18982->18984 18983 2d1ff5a 18984->18983 18985 7548610 18986 7548625 18985->18986 18989 7377a40 18986->18989 18990 7377a85 SetThreadContext 18989->18990 18992 7377acd 18990->18992 18997 7548860 18998 75489eb 18997->18998 18999 7548886 18997->18999 18999->18998 19001 7548ae0 PostMessageW 18999->19001 19002 7548b4c 19001->19002 19002->18999 19003 75468a0 19004 75468b5 19003->19004 19008 75468d8 19004->19008 19013 75468e8 19004->19013 19005 75468cb 19009 75468e8 19008->19009 19018 7546eb8 19009->19018 19037 7546ea9 19009->19037 19014 7546902 19013->19014 19016 7546eb8 4 API calls 19014->19016 19017 7546ea9 4 API calls 19014->19017 19015 754690a 19015->19005 19016->19015 19017->19015 19019 7546ecd 19018->19019 19056 7546f96 19019->19056 19062 754728b 19019->19062 19066 754710f 19019->19066 19072 75471ad 19019->19072 19076 7547302 19019->19076 19080 7547482 19019->19080 19084 7547400 19019->19084 19088 7546f00 19019->19088 19094 7546ff8 19019->19094 19100 754727d 19019->19100 19104 7547233 19019->19104 19108 75471d1 19019->19108 19112 7546ef0 19019->19112 19118 7547017 19019->19118 19124 7546fb7 19019->19124 19130 7547576 19019->19130 19038 7546eb8 19037->19038 19040 7546f96 2 API calls 19038->19040 19041 7547576 ResumeThread 19038->19041 19042 7546fb7 2 API calls 19038->19042 19043 7547017 2 API calls 19038->19043 19044 7546ef0 2 API calls 19038->19044 19045 75471d1 ResumeThread 19038->19045 19046 7547233 ResumeThread 19038->19046 19047 754727d VirtualAllocEx 19038->19047 19048 7546ff8 2 API calls 19038->19048 19049 7546f00 2 API calls 19038->19049 19050 7547400 WriteProcessMemory 19038->19050 19051 7547482 WriteProcessMemory 19038->19051 19052 7547302 ResumeThread 19038->19052 19053 75471ad ResumeThread 19038->19053 19054 754710f 2 API calls 19038->19054 19055 754728b ResumeThread 19038->19055 19039 754690a 19039->19005 19040->19039 19041->19039 19042->19039 19043->19039 19044->19039 19045->19039 19046->19039 19047->19039 19048->19039 19049->19039 19050->19039 19051->19039 19052->19039 19053->19039 19054->19039 19055->19039 19057 7546f7d 19056->19057 19134 7377fe0 19057->19134 19058 7547187 19060 7377960 ResumeThread 19058->19060 19059 7547e51 19060->19059 19063 75471b9 19062->19063 19138 7377960 19063->19138 19067 7546f7d 19066->19067 19071 7377fe0 CreateProcessA 19067->19071 19068 7547187 19070 7377960 ResumeThread 19068->19070 19069 7547e51 19070->19069 19071->19068 19073 75471b9 19072->19073 19075 7377960 ResumeThread 19073->19075 19074 7547e51 19075->19074 19077 75471b9 19076->19077 19079 7377960 ResumeThread 19077->19079 19078 7547e51 19079->19078 19081 7547491 19080->19081 19142 7377cc8 19081->19142 19085 7547406 19084->19085 19087 7377cc8 WriteProcessMemory 19085->19087 19086 7547459 19087->19086 19089 7546f33 19088->19089 19093 7377fe0 CreateProcessA 19089->19093 19090 7547187 19092 7377960 ResumeThread 19090->19092 19091 7547e51 19092->19091 19093->19090 19095 7546f71 19094->19095 19099 7377fe0 CreateProcessA 19095->19099 19096 7547187 19098 7377960 ResumeThread 19096->19098 19097 7547e51 19098->19097 19099->19096 19101 7547368 19100->19101 19146 7548658 19101->19146 19106 75471b9 19104->19106 19105 7547e51 19107 7377960 ResumeThread 19106->19107 19107->19105 19109 75471b9 19108->19109 19111 7377960 ResumeThread 19109->19111 19110 7547e51 19111->19110 19113 7546f00 19112->19113 19117 7377fe0 CreateProcessA 19113->19117 19114 7547187 19116 7377960 ResumeThread 19114->19116 19115 7547e51 19116->19115 19117->19114 19119 7546f7d 19118->19119 19123 7377fe0 CreateProcessA 19119->19123 19120 7547187 19122 7377960 ResumeThread 19120->19122 19121 7547e51 19122->19121 19123->19120 19125 7546f7d 19124->19125 19129 7377fe0 CreateProcessA 19125->19129 19126 7547187 19128 7377960 ResumeThread 19126->19128 19127 7547e51 19128->19127 19129->19126 19131 75471b9 19130->19131 19133 7377960 ResumeThread 19131->19133 19132 7547e51 19133->19132 19135 7378069 CreateProcessA 19134->19135 19137 737822b 19135->19137 19139 73779a0 ResumeThread 19138->19139 19141 73779d1 19139->19141 19143 7377d10 WriteProcessMemory 19142->19143 19145 7377d67 19143->19145 19147 754866d 19146->19147 19150 7377bd8 19147->19150 19151 7377c18 VirtualAllocEx 19150->19151 19153 7377c55 19151->19153 18993 7377de8 18994 7377e33 ReadProcessMemory 18993->18994 18996 7377e77 18994->18996

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 293 7377fe0-7378075 295 7378077-7378081 293->295 296 73780ae-73780ce 293->296 295->296 297 7378083-7378085 295->297 301 7378107-7378136 296->301 302 73780d0-73780da 296->302 299 7378087-7378091 297->299 300 73780a8-73780ab 297->300 303 7378095-73780a4 299->303 304 7378093 299->304 300->296 312 737816f-7378229 CreateProcessA 301->312 313 7378138-7378142 301->313 302->301 305 73780dc-73780de 302->305 303->303 306 73780a6 303->306 304->303 307 7378101-7378104 305->307 308 73780e0-73780ea 305->308 306->300 307->301 310 73780ee-73780fd 308->310 311 73780ec 308->311 310->310 314 73780ff 310->314 311->310 324 7378232-73782b8 312->324 325 737822b-7378231 312->325 313->312 315 7378144-7378146 313->315 314->307 317 7378169-737816c 315->317 318 7378148-7378152 315->318 317->312 319 7378156-7378165 318->319 320 7378154 318->320 319->319 321 7378167 319->321 320->319 321->317 335 73782ba-73782be 324->335 336 73782c8-73782cc 324->336 325->324 335->336 339 73782c0 335->339 337 73782ce-73782d2 336->337 338 73782dc-73782e0 336->338 337->338 340 73782d4 337->340 341 73782e2-73782e6 338->341 342 73782f0-73782f4 338->342 339->336 340->338 341->342 343 73782e8 341->343 344 7378306-737830d 342->344 345 73782f6-73782fc 342->345 343->342 346 7378324 344->346 347 737830f-737831e 344->347 345->344 347->346
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07378216
                              Memory Dump Source
                              • Source File: 00000014.00000002.347511803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_7370000_dhcpmon.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 257804094389697bb00b565501af1c0ad2a9e94bd9d22e3f29f2c1bc11bf3327
                              • Instruction ID: 259eba8686f26415220bd9aeec625cd2ec8a910482af3d5c5778515287b98e39
                              • Opcode Fuzzy Hash: 257804094389697bb00b565501af1c0ad2a9e94bd9d22e3f29f2c1bc11bf3327
                              • Instruction Fuzzy Hash: 6F916FB1D04619DFEF24CF68C8857DEBBB2BF48314F048569D809A7280DB799985CF92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 349 2d19890-2d198a5 call 2d19224 352 2d198a7 349->352 353 2d198bb-2d198bf 349->353 403 2d198ad call 2d19b09 352->403 404 2d198ad call 2d19b18 352->404 354 2d198c1-2d198cb 353->354 355 2d198d3-2d19914 353->355 354->355 360 2d19921-2d1992f 355->360 361 2d19916-2d1991e 355->361 356 2d198b3-2d198b5 356->353 358 2d199f0-2d19ab0 356->358 398 2d19ab2-2d19ab5 358->398 399 2d19ab8-2d19ae3 GetModuleHandleW 358->399 363 2d19931-2d19936 360->363 364 2d19953-2d19955 360->364 361->360 365 2d19941 363->365 366 2d19938-2d1993f call 2d19230 363->366 367 2d19958-2d1995f 364->367 370 2d19943-2d19951 365->370 366->370 371 2d19961-2d19969 367->371 372 2d1996c-2d19973 367->372 370->367 371->372 374 2d19980-2d19989 call 2d19240 372->374 375 2d19975-2d1997d 372->375 379 2d19996-2d1999b 374->379 380 2d1998b-2d19993 374->380 375->374 382 2d199b9-2d199bd 379->382 383 2d1999d-2d199a4 379->383 380->379 405 2d199c0 call 2d19e20 382->405 406 2d199c0 call 2d19e12 382->406 407 2d199c0 call 2d19df2 382->407 383->382 384 2d199a6-2d199b6 call 2d19250 call 2d19260 383->384 384->382 387 2d199c3-2d199c6 390 2d199e9-2d199ef 387->390 391 2d199c8-2d199e6 387->391 391->390 398->399 400 2d19ae5-2d19aeb 399->400 401 2d19aec-2d19b00 399->401 400->401 403->356 404->356 405->387 406->387 407->387
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02D19AD6
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 4347cc6c09d09db4ba52641c4ddf319612e4cd2c62fae541572e9d3d984c9cd1
                              • Instruction ID: d40dd875fc626987fce4214b8bba399ada5ba03bf46a74020721760486751e14
                              • Opcode Fuzzy Hash: 4347cc6c09d09db4ba52641c4ddf319612e4cd2c62fae541572e9d3d984c9cd1
                              • Instruction Fuzzy Hash: F9711570A00B059FDB24DF6AD16479AB7F5BF88214F008A2ED58ADBB40DB35E845CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 408 2d13f88-2d158d9 CreateActCtxA 411 2d158e2-2d1593c 408->411 412 2d158db-2d158e1 408->412 419 2d1594b-2d1594f 411->419 420 2d1593e-2d15941 411->420 412->411 421 2d15951-2d1595d 419->421 422 2d15960 419->422 420->419 421->422 424 2d15961 422->424 424->424
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02D158C9
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: a63c6cc9c1e1cb2c548bc2569f4aa996aba53800b73236b37fd326805cbc7f81
                              • Instruction ID: 66dfa32f40d5e02745a9e2368fed4b1fbd65ccbe6a2133056d55ede2283cf257
                              • Opcode Fuzzy Hash: a63c6cc9c1e1cb2c548bc2569f4aa996aba53800b73236b37fd326805cbc7f81
                              • Instruction Fuzzy Hash: AE41E071C0071CDBDB24CFA9D988B8EBBB1FF88314F508469D409AB291DB756949CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 425 2d1580e-2d158d9 CreateActCtxA 427 2d158e2-2d1593c 425->427 428 2d158db-2d158e1 425->428 435 2d1594b-2d1594f 427->435 436 2d1593e-2d15941 427->436 428->427 437 2d15951-2d1595d 435->437 438 2d15960 435->438 436->435 437->438 440 2d15961 438->440 440->440
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02D158C9
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 2892636ecd0221a8c3a0690eaf2574999cb9e6aa69c076ec482d00c08856962a
                              • Instruction ID: b4029ab98bd36d5da2551b07f1c71fafbde5557af4248a44503fd463a60bc305
                              • Opcode Fuzzy Hash: 2892636ecd0221a8c3a0690eaf2574999cb9e6aa69c076ec482d00c08856962a
                              • Instruction Fuzzy Hash: D641F1B1C00718CEDB24CFA9D9847CEBBB1BF88314F54846AD409AB251DB756949CF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 441 7377cc8-7377d16 443 7377d26-7377d65 WriteProcessMemory 441->443 444 7377d18-7377d24 441->444 446 7377d67-7377d6d 443->446 447 7377d6e-7377d9e 443->447 444->443 446->447
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07377D58
                              Memory Dump Source
                              • Source File: 00000014.00000002.347511803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_7370000_dhcpmon.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: c5d34d94bfbf4d53aa7ae63cda070d78a2d79461de8a7ff12a316a1bfb3ef045
                              • Instruction ID: 6bfa91457438d1ab45251ae1d5a478243787a6d9b55cadb1a9a83b9eea06c333
                              • Opcode Fuzzy Hash: c5d34d94bfbf4d53aa7ae63cda070d78a2d79461de8a7ff12a316a1bfb3ef045
                              • Instruction Fuzzy Hash: 8B2128B69003199FCB10CFA9C984BEEBBF5FF48314F508429E919A7240D7789955CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 451 2d1b924-2d1be4c DuplicateHandle 453 2d1be55-2d1be72 451->453 454 2d1be4e-2d1be54 451->454 454->453
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D1BD7E,?,?,?,?,?), ref: 02D1BE3F
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: ff4b096b5092572123c3ef359e08499013f6469cde8aed70c3921f22c228731b
                              • Instruction ID: 069f410b01c8bbcad9256d7f57caa86f74ae8a7e2198fc09ecca8b0df4e5caf7
                              • Opcode Fuzzy Hash: ff4b096b5092572123c3ef359e08499013f6469cde8aed70c3921f22c228731b
                              • Instruction Fuzzy Hash: 4D21E4B5900308AFDB10CFA9D584BEEFBF8EB48324F14841AE955A3350D374A954CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 457 2d1bdb0-2d1bdb2 458 2d1bdb8-2d1be4c DuplicateHandle 457->458 459 2d1be55-2d1be72 458->459 460 2d1be4e-2d1be54 458->460 460->459
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D1BD7E,?,?,?,?,?), ref: 02D1BE3F
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 36f31091f5d4e37f7cdde047f6a9de003e06aa09c4b650e522eaf95ae4518dbc
                              • Instruction ID: 13114970a73558ab6dcc069c8d709ef8b9805b800eb12ee21649afedb8607002
                              • Opcode Fuzzy Hash: 36f31091f5d4e37f7cdde047f6a9de003e06aa09c4b650e522eaf95ae4518dbc
                              • Instruction Fuzzy Hash: 6E2103B5900208AFCB10CFA9D984BDEFFF8EB48324F14801AE914A7350C774A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 473 7377de8-7377e75 ReadProcessMemory 476 7377e77-7377e7d 473->476 477 7377e7e-7377eae 473->477 476->477
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07377E68
                              Memory Dump Source
                              • Source File: 00000014.00000002.347511803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_7370000_dhcpmon.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 180830727762dd8adbd283746ab698acb8256066a96ccdc8aca2c242735265dd
                              • Instruction ID: 49361b4a74adeeb6199f7dd5ebee5b8f142195161c67ec8f01c4a7c9a2d8cfb8
                              • Opcode Fuzzy Hash: 180830727762dd8adbd283746ab698acb8256066a96ccdc8aca2c242735265dd
                              • Instruction Fuzzy Hash: 182114B18003099FCB10CFAAC984BEEBBF5FF48324F50842AE519A7240C7789945CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 463 7377a40-7377a8b 465 7377a8d-7377a99 463->465 466 7377a9b-7377acb SetThreadContext 463->466 465->466 468 7377ad4-7377b04 466->468 469 7377acd-7377ad3 466->469 469->468
                              APIs
                              • SetThreadContext.KERNELBASE(?,00000000), ref: 07377ABE
                              Memory Dump Source
                              • Source File: 00000014.00000002.347511803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_7370000_dhcpmon.jbxd
                              Similarity
                              • API ID: ContextThread
                              • String ID:
                              • API String ID: 1591575202-0
                              • Opcode ID: 1f4c56f2b6a9ba7659133ea534b7952ab314208aeb650edddac04daaa1c82756
                              • Instruction ID: 23d745d061f9524ca3f33949a70dd70319ad3d12321b25438de253db8f81d0ba
                              • Opcode Fuzzy Hash: 1f4c56f2b6a9ba7659133ea534b7952ab314208aeb650edddac04daaa1c82756
                              • Instruction Fuzzy Hash: 962115B59003099FDB50CFAAC5847EEBBF4EF48324F55842AD519A7340CB78AA45CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 481 2d19270-2d19d38 484 2d19d40-2d19d6f LoadLibraryExW 481->484 485 2d19d3a-2d19d3d 481->485 486 2d19d71-2d19d77 484->486 487 2d19d78-2d19d95 484->487 485->484 486->487
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D19B51,00000800,00000000,00000000), ref: 02D19D62
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 9410ec05e2f5291a727b33445d3817207d3fd9e94a721ce2bc6db8886020330f
                              • Instruction ID: dd6192b3d567d17c102bbc3f26b6df964cb22c901d2bf92aaf8ccb31c765067b
                              • Opcode Fuzzy Hash: 9410ec05e2f5291a727b33445d3817207d3fd9e94a721ce2bc6db8886020330f
                              • Instruction Fuzzy Hash: CC2198B28043489FCB10CFA9C498ADEBBF4AF48224F04845ED555AB701C374A905CFA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 490 2d19288-2d19d38 492 2d19d40-2d19d6f LoadLibraryExW 490->492 493 2d19d3a-2d19d3d 490->493 494 2d19d71-2d19d77 492->494 495 2d19d78-2d19d95 492->495 493->492 494->495
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D19B51,00000800,00000000,00000000), ref: 02D19D62
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 772eb1c652bdfa62c27ab9bb3e870db20c89b35869d3690c8b112c23fe4e97b7
                              • Instruction ID: 3ae6c465f9862fac0596815b2b4213378b901eda7a37777021fe2a31e9a1e3f4
                              • Opcode Fuzzy Hash: 772eb1c652bdfa62c27ab9bb3e870db20c89b35869d3690c8b112c23fe4e97b7
                              • Instruction Fuzzy Hash: CA1114B69003099FCB10CF9AD598BDEFBF4EB48324F04842AE519A7700C775A945CFA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 498 2d19cf0-2d19d38 500 2d19d40-2d19d6f LoadLibraryExW 498->500 501 2d19d3a-2d19d3d 498->501 502 2d19d71-2d19d77 500->502 503 2d19d78-2d19d95 500->503 501->500 502->503
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D19B51,00000800,00000000,00000000), ref: 02D19D62
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: edb561fd5aee7b5af4593dbbfa86cbf81fcd49cffda09651c1f304c2c71a1eb4
                              • Instruction ID: eb1d8cce8523818eb4bb68fff4e58ad68262674b6667d8b3fee5022afb5e954b
                              • Opcode Fuzzy Hash: edb561fd5aee7b5af4593dbbfa86cbf81fcd49cffda09651c1f304c2c71a1eb4
                              • Instruction Fuzzy Hash: DF1126B69003489FCB10CFAAD544BDEFBF4AB48324F14841EE515A7700C775A945CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 506 7377bd8-7377c53 VirtualAllocEx 509 7377c55-7377c5b 506->509 510 7377c5c-7377c81 506->510 509->510
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07377C46
                              Memory Dump Source
                              • Source File: 00000014.00000002.347511803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_7370000_dhcpmon.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 668c2c15c87f90ed1ffcddb2e00a801e5eff6afb11482194bf519cf6228e1402
                              • Instruction ID: c86e1ce1df1b0ce3e3b0e7063e2890c04af9fb4494c2baa15466960bcc1f05bc
                              • Opcode Fuzzy Hash: 668c2c15c87f90ed1ffcddb2e00a801e5eff6afb11482194bf519cf6228e1402
                              • Instruction Fuzzy Hash: 211137769003099FCF10DFA9C944BDFBBF5AF48324F148819E519A7250CB75A954CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 514 7377960-73779cf ResumeThread 517 73779d1-73779d7 514->517 518 73779d8-73779fd 514->518 517->518
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.347511803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_7370000_dhcpmon.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 5b8629eb484fc1bb8f40852d7bf4e81a51eb5ebdf140c308736aece05799528c
                              • Instruction ID: 1bc1ced1fa5fac1ffa1bb6e7829cdd56155a598f3b7637543650e868b8b8bc01
                              • Opcode Fuzzy Hash: 5b8629eb484fc1bb8f40852d7bf4e81a51eb5ebdf140c308736aece05799528c
                              • Instruction Fuzzy Hash: 6A1128B59043488FDB10DFAAC4447EEFBF5AB89224F14881AD519A7240CB79A944CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02D19AD6
                              Memory Dump Source
                              • Source File: 00000014.00000002.342570231.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2d10000_dhcpmon.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 1f88d5fea30c2f3e5001b283b02ad508c4fd7859d93c5c7c865036053291f9f8
                              • Instruction ID: 19e992f7f84e45af6b7989b8f607dffc8c0dc9cc64f4ccd4132fc68770e4f4e1
                              • Opcode Fuzzy Hash: 1f88d5fea30c2f3e5001b283b02ad508c4fd7859d93c5c7c865036053291f9f8
                              • Instruction Fuzzy Hash: EA110FB6C042098FCB10CF9AD544BDEFBF4AB88224F14841AD419B7740C375A949CFA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PostMessageW.USER32(?,?,?,?), ref: 07548B3D
                              Memory Dump Source
                              • Source File: 00000014.00000002.347695105.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_7540000_dhcpmon.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 5ad9d390c09da049de3678edd998930a82d38ab25acaa94fb013f0d366e501a8
                              • Instruction ID: ceff68870d96d65a3dc2fab6b24aca15d26304ea44ac8f066a7abdeb7fcfa8b8
                              • Opcode Fuzzy Hash: 5ad9d390c09da049de3678edd998930a82d38ab25acaa94fb013f0d366e501a8
                              • Instruction Fuzzy Hash: 9811D0B58003499FDB10CF99D989BDEBBF8FB48324F54881AE919A7240C775A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000014.00000002.342313030.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_13cd000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ca8fe8b14779d22e7f740a384a6c48de9c4d6db8f22c8b49039c2b7209c422b7
                              • Instruction ID: b79827b508f6b897c14ac6b2350633d0a076931ef229e4e5ec0d6782f3e5232d
                              • Opcode Fuzzy Hash: ca8fe8b14779d22e7f740a384a6c48de9c4d6db8f22c8b49039c2b7209c422b7
                              • Instruction Fuzzy Hash: 74210371504244DFDB11CF68D9C4B26BBA5FB84768F20C9BDE90A4B646C336DC46CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000014.00000002.342313030.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_13cd000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4daa8881a7189c5bafe35799ddaa10a90a08a8856ad71c9874c0c04fa8974485
                              • Instruction ID: e9dc12a59dc061bc2eced8ca52d00d7e14b9cb9e89477d0b8899423774a7bdd4
                              • Opcode Fuzzy Hash: 4daa8881a7189c5bafe35799ddaa10a90a08a8856ad71c9874c0c04fa8974485
                              • Instruction Fuzzy Hash: 5421F5B1504244EFDB01DF94D9C4B26BBA6FB84728F24C9BDE9094B642C336DC46CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000014.00000002.342313030.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_13cd000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a47c60c820b874e21bac86ed580c4c4fb040c781bc394da46f9e5a640afe0133
                              • Instruction ID: 2f26c840cd595abbb2f14c225f338b7aae4aa39162b3c6e2e4e28945b2f7c87b
                              • Opcode Fuzzy Hash: a47c60c820b874e21bac86ed580c4c4fb040c781bc394da46f9e5a640afe0133
                              • Instruction Fuzzy Hash: 1A2180754083809FCB02CF68D994B11BF71EB46214F28C5EAD8458B657C33A9846CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000014.00000002.342313030.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_13cd000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 486825640ab96ba3e39a8b38934c490916e905c8cff2a83d251abf765d7060b2
                              • Instruction ID: 98f880416064c4ed9dec5ebb24dce1808f49a6a4190dfee2050f623bdf25a76b
                              • Opcode Fuzzy Hash: 486825640ab96ba3e39a8b38934c490916e905c8cff2a83d251abf765d7060b2
                              • Instruction Fuzzy Hash: A0118E76504280DFDB12CF54D5C4B15BBB2FB84728F24C6ADE8494B656C33AD84ACBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:9.2%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:89
                              Total number of Limit Nodes:5
                              execution_graph 14250 52d6758 14253 52d6344 14250->14253 14252 52d6766 14254 52d634f 14253->14254 14257 52d6394 14254->14257 14256 52d688d 14256->14252 14258 52d639f 14257->14258 14261 52d63c4 14258->14261 14260 52d6962 14260->14256 14262 52d63cf 14261->14262 14265 52d63f4 14262->14265 14264 52d6a62 14264->14260 14266 52d63ff 14265->14266 14268 52d717e 14266->14268 14271 52d92b9 14266->14271 14267 52d71bc 14267->14264 14268->14267 14275 52db3f9 14268->14275 14280 52d92e1 14271->14280 14284 52d92f0 14271->14284 14272 52d92ce 14272->14268 14276 52db429 14275->14276 14277 52db44d 14276->14277 14307 52db5b8 14276->14307 14311 52db5ab 14276->14311 14277->14267 14281 52d92f0 14280->14281 14287 52d93e8 14281->14287 14282 52d92ff 14282->14272 14286 52d93e8 2 API calls 14284->14286 14285 52d92ff 14285->14272 14286->14285 14288 52d93fb 14287->14288 14289 52d9413 14288->14289 14295 52d9660 14288->14295 14299 52d9670 14288->14299 14289->14282 14290 52d940b 14290->14289 14291 52d9610 GetModuleHandleW 14290->14291 14292 52d963d 14291->14292 14292->14282 14297 52d9670 14295->14297 14296 52d96a9 14296->14290 14297->14296 14303 52d8768 14297->14303 14300 52d9684 14299->14300 14301 52d96a9 14300->14301 14302 52d8768 LoadLibraryExW 14300->14302 14301->14290 14302->14301 14304 52d9850 LoadLibraryExW 14303->14304 14306 52d98c9 14304->14306 14306->14296 14308 52db5c5 14307->14308 14309 52db5ff 14308->14309 14315 52da0ec 14308->14315 14309->14277 14312 52db5b2 14311->14312 14313 52db5ff 14312->14313 14314 52da0ec 6 API calls 14312->14314 14313->14277 14314->14313 14316 52da0f7 14315->14316 14318 52dc2f8 14316->14318 14319 52db904 14316->14319 14318->14318 14320 52db90f 14319->14320 14321 52d63f4 6 API calls 14320->14321 14322 52dc367 14321->14322 14331 52dc3d3 14322->14331 14337 52dc3e0 14322->14337 14323 52dc375 14324 52db914 LoadLibraryExW GetModuleHandleW 14323->14324 14325 52dc38f 14324->14325 14329 52de0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW 14325->14329 14330 52de0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW 14325->14330 14326 52dc3a0 14326->14318 14329->14326 14330->14326 14332 52dc3e0 14331->14332 14334 52dc437 14332->14334 14336 52dc4df 14332->14336 14343 52db9a0 14332->14343 14335 52dc4da KiUserCallbackDispatcher 14334->14335 14334->14336 14335->14336 14338 52dc40e 14337->14338 14339 52db9a0 GetFocus 14338->14339 14340 52dc437 14338->14340 14342 52dc4df 14338->14342 14339->14340 14341 52dc4da KiUserCallbackDispatcher 14340->14341 14340->14342 14341->14342 14344 52db9ab 14343->14344 14345 52dba14 GetFocus 14344->14345 14346 52dc9f5 14345->14346 14346->14334 14246 52dbd00 DuplicateHandle 14247 52dbd96 14246->14247 14248 52dfe40 SetWindowLongW 14249 52dfeac 14248->14249 14347 52db6d0 GetCurrentProcess 14348 52db74a GetCurrentThread 14347->14348 14349 52db743 14347->14349 14350 52db787 GetCurrentProcess 14348->14350 14351 52db780 14348->14351 14349->14348 14354 52db7bd 14350->14354 14351->14350 14352 52db7e5 GetCurrentThreadId 14353 52db816 14352->14353 14354->14352
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c4a35ca11f5f51e5ce4cad5da097c39b66b78e1d23348eeebdafe8d08e10ae88
                              • Instruction ID: 4186edd122987bc9a1a54f8d6c67b715952ab4b535641c29c7a73596e586922a
                              • Opcode Fuzzy Hash: c4a35ca11f5f51e5ce4cad5da097c39b66b78e1d23348eeebdafe8d08e10ae88
                              • Instruction Fuzzy Hash: 7BF0E23A714285CFD728EF71F94D3217FE5EB00201F0C0419D08A86385E72CA495E730
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 052DB730
                              • GetCurrentThread.KERNEL32 ref: 052DB76D
                              • GetCurrentProcess.KERNEL32 ref: 052DB7AA
                              • GetCurrentThreadId.KERNEL32 ref: 052DB803
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: c5c2dac9d09b3fed179eb5e469f3478a838b89ba1458e242c8b6eaad28d53e44
                              • Instruction ID: c911d7f95adcb1887e2de9b2b3e35ec8ba123ffd081f5a44449ed6a352dfcb4a
                              • Opcode Fuzzy Hash: c5c2dac9d09b3fed179eb5e469f3478a838b89ba1458e242c8b6eaad28d53e44
                              • Instruction Fuzzy Hash: 145147B49106098FDB14CFA9D648BEEBBF1FF48314F208469E019A73A0DB745844CF65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 052DB730
                              • GetCurrentThread.KERNEL32 ref: 052DB76D
                              • GetCurrentProcess.KERNEL32 ref: 052DB7AA
                              • GetCurrentThreadId.KERNEL32 ref: 052DB803
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: e4e8b02ba240065e30bd5952aba59a278ac95956264c8f2421553e50d999a67b
                              • Instruction ID: f4096aab1bcc8a56b7766cb7ba226d872d8b333c79eff071c24a044a4d5a276a
                              • Opcode Fuzzy Hash: e4e8b02ba240065e30bd5952aba59a278ac95956264c8f2421553e50d999a67b
                              • Instruction Fuzzy Hash: 835157B49102098FDB14CFA9D648B9EFBF1BF48314F208469E019A73A0DB749844CF66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 052D962E
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 73c14b571ac7e725bfbaf7975d59f1539cb641702cce1b5cb85ba6c55a64409a
                              • Instruction ID: 3b12e9c723b5cf64c7e2b8008b82e32253c28b423bcc5f4e6a0c307c79b123d7
                              • Opcode Fuzzy Hash: 73c14b571ac7e725bfbaf7975d59f1539cb641702cce1b5cb85ba6c55a64409a
                              • Instruction Fuzzy Hash: AA711470A10B058FD764DF2AD54476ABBF2BF88214F00892DE58AD7B40DB75E845CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 97 52dfb98-52dfbac 98 52dfbae-52dfbd8 call 52dda04 97->98 99 52dfbe6-52dfc5e 97->99 102 52dfbdd-52dfbde 98->102 103 52dfc69-52dfc70 99->103 104 52dfc60-52dfc66 99->104 105 52dfc7b-52dfd1a CreateWindowExW 103->105 106 52dfc72-52dfc78 103->106 104->103 108 52dfd1c-52dfd22 105->108 109 52dfd23-52dfd5b 105->109 106->105 108->109 113 52dfd5d-52dfd60 109->113 114 52dfd68 109->114 113->114 115 52dfd69 114->115 115->115
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 052DFD0A
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: 13b6fc1a3965b4feb8535a81d85e512662f3a0f70057e2608c156c20b4ac1a6f
                              • Instruction ID: be4ec31ed9cfd4f01c85f086ca8afa7612350b03c089a5b5c84ad549983c71f1
                              • Opcode Fuzzy Hash: 13b6fc1a3965b4feb8535a81d85e512662f3a0f70057e2608c156c20b4ac1a6f
                              • Instruction Fuzzy Hash: DC5122B5C14249EFCF01CFA9C984ADDBFB2BF48314F28815AE809AB220D7719945CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 116 52dfb61-52dfb88 117 52dfbec-52dfc5e 116->117 118 52dfb8a-52dfb93 116->118 119 52dfc69-52dfc70 117->119 120 52dfc60-52dfc66 117->120 121 52dfc7b-52dfcb3 119->121 122 52dfc72-52dfc78 119->122 120->119 123 52dfcbb-52dfd1a CreateWindowExW 121->123 122->121 124 52dfd1c-52dfd22 123->124 125 52dfd23-52dfd5b 123->125 124->125 129 52dfd5d-52dfd60 125->129 130 52dfd68 125->130 129->130 131 52dfd69 130->131 131->131
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 052DFD0A
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: 09141e1e085cdb2564f9bead1a30e043170eb999178090af822a4d66d296dac0
                              • Instruction ID: e6c98b3e8f183266da2ff7ff8bb00d813321517851b282d617a5869275bf99aa
                              • Opcode Fuzzy Hash: 09141e1e085cdb2564f9bead1a30e043170eb999178090af822a4d66d296dac0
                              • Instruction Fuzzy Hash: 0E51FEB1D143499FDB14CFA9D984ADEFBB1FF48314F24812AE809AB210D771A985CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 132 52dfbf8-52dfc5e 133 52dfc69-52dfc70 132->133 134 52dfc60-52dfc66 132->134 135 52dfc7b-52dfcb3 133->135 136 52dfc72-52dfc78 133->136 134->133 137 52dfcbb-52dfd1a CreateWindowExW 135->137 136->135 138 52dfd1c-52dfd22 137->138 139 52dfd23-52dfd5b 137->139 138->139 143 52dfd5d-52dfd60 139->143 144 52dfd68 139->144 143->144 145 52dfd69 144->145 145->145
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 052DFD0A
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: 5390c6c095d05fda615296bade1c7fb1289eeffe7844d9369e8107ad6996e646
                              • Instruction ID: c96d129f85867a891d939b22b15255d4d6dcfe558cf4bbb7919124f10cbf26af
                              • Opcode Fuzzy Hash: 5390c6c095d05fda615296bade1c7fb1289eeffe7844d9369e8107ad6996e646
                              • Instruction Fuzzy Hash: 3641CFB1D14309DFDB14CF99C984ADEFBB5BF48314F24812AE819AB210D7749985CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 146 52dbcf9-52dbcfb 147 52dbd00-52dbd94 DuplicateHandle 146->147 148 52dbd9d-52dbdba 147->148 149 52dbd96-52dbd9c 147->149 149->148
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 052DBD87
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: d83e4521891df57354fdd872767d2c0c5c7f1e57863835e123a1cdddafc2d6bf
                              • Instruction ID: a513d99f6b5e78719c81de273f18237cac08bcad920fc5dd9613cfc74f5b0e55
                              • Opcode Fuzzy Hash: d83e4521891df57354fdd872767d2c0c5c7f1e57863835e123a1cdddafc2d6bf
                              • Instruction Fuzzy Hash: 612103B59002089FCB10CFAAD984ADEFFF4EF48324F14841AE918A3310D379A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 152 52dbd00-52dbd94 DuplicateHandle 153 52dbd9d-52dbdba 152->153 154 52dbd96-52dbd9c 152->154 154->153
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 052DBD87
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: f70ed38ba9bbe51930c4e1b7f03b0374005e9951c507b8ca2bb03c1b1798d3a8
                              • Instruction ID: af7d69877035126c4a3c2f61de638278d9a79abfe1537848536c8ea386127de6
                              • Opcode Fuzzy Hash: f70ed38ba9bbe51930c4e1b7f03b0374005e9951c507b8ca2bb03c1b1798d3a8
                              • Instruction Fuzzy Hash: DB21C4B59002099FDB10CF9AD584ADEFFF4FB48324F15841AE954A7350D778A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 157 52d8768-52d9890 159 52d9898-52d98c7 LoadLibraryExW 157->159 160 52d9892-52d9895 157->160 161 52d98c9-52d98cf 159->161 162 52d98d0-52d98ed 159->162 160->159 161->162
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,052D96A9,00000800,00000000,00000000), ref: 052D98BA
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: f1739044e5da97d6bf9c67d79cc1fc0afd4f4407adbfbe190ca634c136a65f80
                              • Instruction ID: be1fc06a9c34b33225ac8fb5cddbd5ddfd57fe2187129e2dd716eedddacaef75
                              • Opcode Fuzzy Hash: f1739044e5da97d6bf9c67d79cc1fc0afd4f4407adbfbe190ca634c136a65f80
                              • Instruction Fuzzy Hash: CC1103B69042499FCB10CF9AC448BDEFBF4EF48724F14842EE519A7600C7B5A945CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 165 52d9849-52d9890 167 52d9898-52d98c7 LoadLibraryExW 165->167 168 52d9892-52d9895 165->168 169 52d98c9-52d98cf 167->169 170 52d98d0-52d98ed 167->170 168->167 169->170
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,052D96A9,00000800,00000000,00000000), ref: 052D98BA
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: e2fee3658ea8a9ac8bde616503b56b1a1dbab1c077b2863655a874933aef86db
                              • Instruction ID: 6edb39feb325064b5bfe10485a4efd1c48f6c95db97f4206dfd06e262fc43f4d
                              • Opcode Fuzzy Hash: e2fee3658ea8a9ac8bde616503b56b1a1dbab1c077b2863655a874933aef86db
                              • Instruction Fuzzy Hash: AC1103B6D042099FDB10CFAAC548ADEFBF4EF48724F14842AE519A7600C774A945CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 173 52d95c8-52d9608 174 52d960a-52d960d 173->174 175 52d9610-52d963b GetModuleHandleW 173->175 174->175 176 52d963d-52d9643 175->176 177 52d9644-52d9658 175->177 176->177
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 052D962E
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 9c96e294457ca75ac6bdebba7aa5f19290d1b2d02ce628df8bef819620faf4ea
                              • Instruction ID: 38a161eb5a1b447232401d6358c6a75fbdce5b2dba8bfab9f8e1d093576b6b00
                              • Opcode Fuzzy Hash: 9c96e294457ca75ac6bdebba7aa5f19290d1b2d02ce628df8bef819620faf4ea
                              • Instruction Fuzzy Hash: 9F11E0B5C046498FCB10CF9AC544BDEFBF4EF89224F14841AD429B7610D775A545CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 179 52dfe38-52dfe3a 180 52dfe40-52dfeaa SetWindowLongW 179->180 181 52dfeac-52dfeb2 180->181 182 52dfeb3-52dfec7 180->182 181->182
                              APIs
                              • SetWindowLongW.USER32(?,?,?), ref: 052DFE9D
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID:
                              • API String ID: 1378638983-0
                              • Opcode ID: 3d5e0afa7a659b230e7a75a425678fd406b2f16cf9bb097f24c3c79854cf2a5b
                              • Instruction ID: 8753633e3253dc5aa2ab32f76bd3c9dd18a6614665cb709fa1e24bd21560e416
                              • Opcode Fuzzy Hash: 3d5e0afa7a659b230e7a75a425678fd406b2f16cf9bb097f24c3c79854cf2a5b
                              • Instruction Fuzzy Hash: C91103B58002499FDB10CF99D589BDEFBF8EB48724F10841AE919A7341C774A944CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 184 52dfe40-52dfeaa SetWindowLongW 185 52dfeac-52dfeb2 184->185 186 52dfeb3-52dfec7 184->186 185->186
                              APIs
                              • SetWindowLongW.USER32(?,?,?), ref: 052DFE9D
                              Memory Dump Source
                              • Source File: 0000001B.00000002.361306918.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_52d0000_dhcpmon.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID:
                              • API String ID: 1378638983-0
                              • Opcode ID: 28dbdff71ccb9fac3de12a1a55228f5203ed1b3842cd1cd5636bf050121ec4bb
                              • Instruction ID: 30391a210adef55b738aa875e6236a3cc8abcadca7709c7e7064e5d06e1444d4
                              • Opcode Fuzzy Hash: 28dbdff71ccb9fac3de12a1a55228f5203ed1b3842cd1cd5636bf050121ec4bb
                              • Instruction Fuzzy Hash: 6111E2B58002499FDB10CF99D589BDEFBF8EB48324F14845AD919A7341C374A944CFA6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000001B.00000002.359756761.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_11ed000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 41687de5ecd285649a58965e7eaf75cb238985b71ab081937ad2326beccc0e9d
                              • Instruction ID: a9ef6fbfe09af6ebe46ef0d818056d4c9730c4552b29607b63a4461271cae285
                              • Opcode Fuzzy Hash: 41687de5ecd285649a58965e7eaf75cb238985b71ab081937ad2326beccc0e9d
                              • Instruction Fuzzy Hash: 422106B1504644DFDF09CFD4E9C8B26BFB5FB84328F2485A9E9054B216C336D855CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000001B.00000002.359887585.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_11fd000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45bc042cacc9413957112f9ba4d5cc4b32673c234d06e9b9c672ce17c37f2f65
                              • Instruction ID: ede85dea9afa0ec9d248c1f4d742ddf4a54ce04351b35ad49b82304b06666751
                              • Opcode Fuzzy Hash: 45bc042cacc9413957112f9ba4d5cc4b32673c234d06e9b9c672ce17c37f2f65
                              • Instruction Fuzzy Hash: 0F213370504200DFDF19CF64E5C4B36BB61EB84364F20C9ADDA094B242C336D806CA62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000001B.00000002.359887585.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_11fd000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 180f744ad8666cd8d604a16a331e5662c692791148529bceecc43831398bde4b
                              • Instruction ID: 12d22119ced42939012c7879ac619f5a5bf98d112591fd5881b8fc95eb40a8f9
                              • Opcode Fuzzy Hash: 180f744ad8666cd8d604a16a331e5662c692791148529bceecc43831398bde4b
                              • Instruction Fuzzy Hash: C4218E755093808FDB17CF24D990B15BF71EB46214F28C5EED9498B667C33A980ACB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000001B.00000002.359756761.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_27_2_11ed000_dhcpmon.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd11a6915065f88f4dc5ee675cdba5aa4dd08ecf0b3a926c3046c5ef60737c16
                              • Instruction ID: 8f5313f84eb683ab2f7a22ff252bf8ee91d2917dd9d16e7735e0c075eb7a696f
                              • Opcode Fuzzy Hash: dd11a6915065f88f4dc5ee675cdba5aa4dd08ecf0b3a926c3046c5ef60737c16
                              • Instruction Fuzzy Hash: 1211DF76804280CFDF16CF94D5C4B16BFB1FB84324F2486A9D8054B616C336D456CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%