Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Shaheed CV.exe

Overview

General Information

Sample Name:Shaheed CV.exe
Analysis ID:713264
MD5:bea958c83d0aa73cdf2c72485c4d2fe8
SHA1:ffc8e9e84a7b7cb625bfebd041ce39ec0f20c573
SHA256:3507dd4118b87dcecb315684892df75af68bcfa1860a10f17309a76fecc45fda
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Shaheed CV.exe (PID: 4896 cmdline: "C:\Users\user\Desktop\Shaheed CV.exe" MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
    • Shaheed CV.exe (PID: 4408 cmdline: {path} MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
      • schtasks.exe (PID: 5248 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 1372 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA49.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Shaheed CV.exe (PID: 5432 cmdline: "C:\Users\user\Desktop\Shaheed CV.exe" 0 MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
    • Shaheed CV.exe (PID: 3888 cmdline: {path} MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
  • dhcpmon.exe (PID: 5336 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
    • dhcpmon.exe (PID: 3192 cmdline: {path} MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
  • dhcpmon.exe (PID: 4884 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
    • dhcpmon.exe (PID: 4928 cmdline: {path} MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
    • dhcpmon.exe (PID: 2232 cmdline: {path} MD5: BEA958C83D0AA73CDF2C72485C4D2FE8)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "99bdd317-26d2-4098-abcb-4bff156f", "Group": "Default", "Domain1": "xp230522.ddns.net", "Domain2": "xp230522.ddns.net", "Port": 1996, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000012.00000002.403654416.000000000400E000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x1d91:$a1: NanoCore.ClientPluginHost
  • 0x1d5c:$a2: NanoCore.ClientPlugin
  • 0x1dab:$b9: IClientLoggingHost
00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5b99:$x1: NanoCore.ClientPluginHost
  • 0x5bb3:$x2: IClientNetworkHost
00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x5b99:$x2: NanoCore.ClientPluginHost
  • 0x6bce:$s4: PipeCreated
  • 0x5b86:$s5: IClientLoggingHost
00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x5b70:$x2: NanoCore.ClientPlugin
  • 0x5b99:$x3: NanoCore.ClientPluginHost
  • 0x5b61:$i3: IClientNetwork
  • 0x5b86:$i6: IClientLoggingHost
  • 0x5bb3:$i7: IClientNetworkHost
  • 0x59d4:$s1: ClientPlugin
  • 0x5b79:$s1: ClientPlugin
  • 0x5e84:$s2: EndPoint
  • 0x5e8d:$s3: IPAddress
  • 0x5e97:$s4: IPEndPoint
00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x5b99:$a1: NanoCore.ClientPluginHost
  • 0x5b70:$a2: NanoCore.ClientPlugin
  • 0x5b86:$b9: IClientLoggingHost
Click to see the 111 entries
SourceRuleDescriptionAuthorStrings
1.2.Shaheed CV.exe.70e0000.31.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x39eb:$x1: NanoCore.ClientPluginHost
  • 0x3a24:$x2: IClientNetworkHost
1.2.Shaheed CV.exe.70e0000.31.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x39eb:$x2: NanoCore.ClientPluginHost
  • 0x3b36:$s4: PipeCreated
  • 0x3a05:$s5: IClientLoggingHost
1.2.Shaheed CV.exe.70e0000.31.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x3a8b:$x2: NanoCore.ClientPlugin
  • 0x39eb:$x3: NanoCore.ClientPluginHost
  • 0x3aa1:$i3: IClientNetwork
  • 0x3a43:$i5: IClientDataHost
  • 0x3a05:$i6: IClientLoggingHost
  • 0x3a24:$i7: IClientNetworkHost
  • 0x426c:$i9: IClientNameObjectCollection
  • 0x3741:$s1: ClientPlugin
  • 0x3a94:$s1: ClientPlugin
  • 0x4680:$s2: EndPoint
  • 0x4371:$s3: IPAddress
  • 0x3c83:$s4: IPEndPoint
  • 0x43a3:$s7: get_Connected
1.2.Shaheed CV.exe.70e0000.31.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x39eb:$a1: NanoCore.ClientPluginHost
  • 0x3a8b:$a2: NanoCore.ClientPlugin
  • 0x47e1:$b7: LogClientException
  • 0x3a05:$b9: IClientLoggingHost
1.2.Shaheed CV.exe.70c0000.29.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x605:$x1: NanoCore.ClientPluginHost
  • 0x63e:$x2: IClientNetworkHost
Click to see the 280 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Shaheed CV.exe, ProcessId: 4408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Shaheed CV.exe, ProcessId: 4408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: {path}, ParentImage: C:\Users\user\Desktop\Shaheed CV.exe, ParentProcessId: 4408, ParentProcessName: Shaheed CV.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmp, ProcessId: 5248, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Shaheed CV.exe, ProcessId: 4408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Shaheed CV.exe, ProcessId: 4408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.6171.22.30.564971319962816766 09/30/22-09:26:24.690008
SID:2816766
Source Port:49713
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564970819962816766 09/30/22-09:25:36.584358
SID:2816766
Source Port:49708
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971119962816766 09/30/22-09:26:05.851073
SID:2816766
Source Port:49711
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.56192.168.2.61996497092841753 09/30/22-09:25:50.769492
SID:2841753
Source Port:1996
Destination Port:49709
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971519962816766 09/30/22-09:26:38.673509
SID:2816766
Source Port:49715
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.56192.168.2.61996497102810290 09/30/22-09:25:57.326283
SID:2810290
Source Port:1996
Destination Port:49710
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971719962816766 09/30/22-09:26:53.127416
SID:2816766
Source Port:49717
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.56192.168.2.61996497202841753 09/30/22-09:27:34.295512
SID:2841753
Source Port:1996
Destination Port:49720
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971919962816766 09/30/22-09:27:08.238198
SID:2816766
Source Port:49719
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971219962816766 09/30/22-09:26:16.947839
SID:2816766
Source Port:49712
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564970919962816766 09/30/22-09:25:48.107989
SID:2816766
Source Port:49709
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971019962816766 09/30/22-09:25:57.843394
SID:2816766
Source Port:49710
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971219962816718 09/30/22-09:26:15.388652
SID:2816718
Source Port:49712
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971619962816766 09/30/22-09:26:46.628726
SID:2816766
Source Port:49716
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971419962816766 09/30/22-09:26:32.573764
SID:2816766
Source Port:49714
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.6171.22.30.564971819962816766 09/30/22-09:27:02.115598
SID:2816766
Source Port:49718
Destination Port:1996
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Shaheed CV.exeAvira: detected
Source: xp230522.ddns.netVirustotal: Detection: 12%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: HEUR/AGEN.1250538
Source: Yara matchFile source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTR
Source: Shaheed CV.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 1.0.Shaheed CV.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 1.2.Shaheed CV.exe.5550000.21.unpackAvira: Label: TR/NanoCore.fadte
Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "99bdd317-26d2-4098-abcb-4bff156f", "Group": "Default", "Domain1": "xp230522.ddns.net", "Domain2": "xp230522.ddns.net", "Port": 1996, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: Shaheed CV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Shaheed CV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp

Networking

barindex
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49708 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49709 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.56:1996 -> 192.168.2.6:49709
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49710 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 171.22.30.56:1996 -> 192.168.2.6:49710
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49711 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49712 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.6:49712 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49713 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49714 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49715 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49716 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49717 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49718 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49719 -> 171.22.30.56:1996
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.56:1996 -> 192.168.2.6:49720
Source: Malware configuration extractorURLs: xp230522.ddns.net
Source: unknownDNS query: name: xp230522.ddns.net
Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
Source: global trafficTCP traffic: 192.168.2.6:49708 -> 171.22.30.56:1996
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246140536.0000000005BE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: Shaheed CV.exe, 00000000.00000003.246864672.0000000005BDF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246787210.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
Source: Shaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com8
Source: Shaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
Source: Shaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comatt
Source: Shaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comionq
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: Shaheed CV.exe, 00000000.00000003.246787210.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comt
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: Shaheed CV.exe, 00000000.00000003.263486813.0000000005BD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comce
Source: Shaheed CV.exe, 00000000.00000003.263486813.0000000005BD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
Source: Shaheed CV.exe, 00000000.00000003.263486813.0000000005BD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm3
Source: Shaheed CV.exe, 00000000.00000003.242986910.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: Shaheed CV.exe, 00000000.00000003.249427675.0000000005BF0000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: Shaheed CV.exe, 00000000.00000003.248783937.0000000005BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
Source: Shaheed CV.exe, 00000000.00000003.245029512.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245241266.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246415982.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243346345.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243198416.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246155308.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.242673254.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245415325.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.244376932.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.244305278.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247562154.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243411948.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245719163.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245160199.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245492602.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.242939851.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.241882169.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.244760078.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245671794.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247710170.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247216864.0000000005BEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: Shaheed CV.exe, 00000000.00000003.248315965.0000000005BF2000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: Shaheed CV.exe, 00000000.00000003.247267273.0000000005BF1000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247349700.0000000005BF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comlic
Source: Shaheed CV.exe, 00000000.00000003.243437245.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243362658.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.net
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: Shaheed CV.exe, 00000000.00000003.243437245.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243362658.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netnl4
Source: Shaheed CV.exe, 00000000.00000003.243437245.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243362658.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netz1
Source: Shaheed CV.exe, 00000000.00000003.249141608.0000000005BF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: xp230522.ddns.net
Source: Shaheed CV.exe, 00000000.00000002.264013577.0000000000A49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTR

System Summary

barindex
Source: 1.2.Shaheed CV.exe.70e0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70e0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70e0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70c0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70c0000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7160000.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7160000.37.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7160000.37.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70b0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70b0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70b0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.3d4e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.3d4e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.3d4e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.47fc61c.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.47fc61c.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.47fc61c.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70e0000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70e0000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70e0000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.6670000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.6670000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.6670000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7120000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7120000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7120000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 19.2.dhcpmon.exe.329965c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.dhcpmon.exe.329965c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 19.2.dhcpmon.exe.329965c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.6f10000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.6f10000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.6f10000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7090000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7090000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7090000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.6670000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.6670000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.6670000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.712e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.712e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.712e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.48b9696.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.48b9696.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.48b9696.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70a0000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70a0000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70a0000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70f0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70f0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70f0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.5540000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.5540000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.5540000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.48b0867.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.48b0867.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.48b0867.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7124c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7124c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7124c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70a0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70a0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70a0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.46e5c69.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.46e5c69.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.46e5c69.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.3d49930.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.3d49930.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.3d49930.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.48c7ac6.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.48c7ac6.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.48c7ac6.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.46f1e9d.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.46f1e9d.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.46f1e9d.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.Shaheed CV.exe.301958c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.Shaheed CV.exe.301958c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.Shaheed CV.exe.301958c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.6f10000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.6f10000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.6f10000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70f0000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70f0000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70f0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.Shaheed CV.exe.3ffb7ae.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.Shaheed CV.exe.3ffb7ae.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.Shaheed CV.exe.3ffb7ae.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7110000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7110000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7110000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.Shaheed CV.exe.40005e4.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.Shaheed CV.exe.40005e4.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.Shaheed CV.exe.40005e4.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.48c7ac6.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.48c7ac6.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.48c7ac6.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7160000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7160000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7160000.37.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7110000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7110000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7110000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.70d0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.70d0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.70d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.3d581d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.3d581d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.3d581d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.7120000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.7120000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.7120000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.48b9696.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.48b9696.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.48b9696.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.3d49930.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.2d9f364.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.2d9f364.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.2d9f364.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.3d49930.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.3d49930.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.403654416.000000000400E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.403274871.0000000003FF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.524873341.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000003.291412562.0000000006698000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Shaheed CV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1.2.Shaheed CV.exe.70e0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70e0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70e0000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70e0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70c0000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7160000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7160000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7160000.37.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7160000.37.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70b0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70b0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70b0000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70b0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.3d4e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d4e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d4e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.3d4e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.47fc61c.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47fc61c.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47fc61c.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.47fc61c.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70e0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70e0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70e0000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70e0000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.6670000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6670000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6670000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.6670000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7120000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7120000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7120000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7120000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 19.2.dhcpmon.exe.329965c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 19.2.dhcpmon.exe.329965c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 19.2.dhcpmon.exe.329965c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 19.2.dhcpmon.exe.329965c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.6f10000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6f10000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6f10000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.6f10000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7090000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7090000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7090000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7090000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.6670000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6670000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6670000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.6670000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.712e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.712e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.712e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.712e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.48b9696.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b9696.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b9696.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.48b9696.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70a0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70a0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70a0000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70a0000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.48b0867.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70f0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70f0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70f0000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70f0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.5540000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5540000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5540000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.5540000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.48b0867.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b0867.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b0867.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.48b0867.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.47fc61c.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7124c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7124c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7124c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7124c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70a0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70a0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70a0000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70a0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.46e5c69.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.46e5c69.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.46e5c69.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.46e5c69.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.3d49930.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d49930.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d49930.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.3d49930.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.48c7ac6.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48c7ac6.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48c7ac6.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.48c7ac6.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.46f1e9d.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.46f1e9d.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.46f1e9d.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.46f1e9d.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.Shaheed CV.exe.301958c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.301958c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.301958c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.Shaheed CV.exe.301958c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.6f10000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6f10000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.6f10000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.6f10000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70f0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70f0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70f0000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70f0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.Shaheed CV.exe.3ffb7ae.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.3ffb7ae.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.3ffb7ae.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.Shaheed CV.exe.3ffb7ae.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7110000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7110000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7110000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7110000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.Shaheed CV.exe.40005e4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.40005e4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.Shaheed CV.exe.40005e4.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.Shaheed CV.exe.40005e4.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.48c7ac6.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48c7ac6.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48c7ac6.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.48c7ac6.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7160000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7160000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7160000.37.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7160000.37.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7110000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7110000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7110000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7110000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.70d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.70d0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.70d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.3d581d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d581d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d581d4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.3d581d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.7120000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7120000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.7120000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.7120000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.48b9696.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b9696.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.48b9696.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.48b9696.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.2dc5a5c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.2dd1ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.3d49930.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d49930.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.2d9f364.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.2d9f364.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.2d9f364.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.3d49930.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.3d49930.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.403654416.000000000400E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.403274871.0000000003FF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.524873341.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000003.291412562.0000000006698000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: Shaheed CV.exe PID: 5432, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 5336, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 4884, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 0_2_025D46200_2_025D4620
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 0_2_025D43D80_2_025D43D8
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 0_2_025D46100_2_025D4610
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 0_2_025DCB9C0_2_025DCB9C
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 0_2_025DF4400_2_025DF440
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 0_2_025DF4300_2_025DF430
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 0_2_05AAF5200_2_05AAF520
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_066702B01_2_066702B0
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_02BEE4801_2_02BEE480
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_02BEBBD41_2_02BEBBD4
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_0755C6281_2_0755C628
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_0755BD581_2_0755BD58
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_075525901_2_07552590
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_07551CB01_2_07551CB0
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_07554B181_2_07554B18
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_075539581_2_07553958
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_075510981_2_07551098
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_07551FF01_2_07551FF0
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_07551D6E1_2_07551D6E
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_07554BD61_2_07554BD6
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_0755BA101_2_0755BA10
Source: Shaheed CV.exe, 00000000.00000002.283678911.0000000006D90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000000.00000002.290212833.0000000007720000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000000.00000002.264013577.0000000000A49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000000.00000002.268171209.000000000276B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000000.00000000.235947155.00000000002D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYlyaWRA.exe: vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Shaheed CV.exe
Source: Shaheed CV.exeBinary or memory string: OriginalFilename vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.524873341.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.524873341.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.524873341.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.541224831.0000000007118000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.541841831.000000000716E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.541549078.0000000007148000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.525245666.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000003.291412562.0000000006698000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.537586498.0000000006510000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000007.00000002.344687334.00000000016E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000007.00000002.363822663.00000000045AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000012.00000002.403274871.0000000003FF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000012.00000002.404008541.0000000004020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exe, 00000012.00000002.403901950.0000000004018000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Shaheed CV.exe
Source: Shaheed CV.exeBinary or memory string: OriginalFilenameYlyaWRA.exe: vs Shaheed CV.exe
Source: C:\Users\user\Desktop\Shaheed CV.exeFile read: C:\Users\user\Desktop\Shaheed CV.exeJump to behavior
Source: Shaheed CV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Shaheed CV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Shaheed CV.exe "C:\Users\user\Desktop\Shaheed CV.exe"
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Users\user\Desktop\Shaheed CV.exe {path}
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA49.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\Shaheed CV.exe "C:\Users\user\Desktop\Shaheed CV.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Users\user\Desktop\Shaheed CV.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Users\user\Desktop\Shaheed CV.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmpJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA49.tmpJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Users\user\Desktop\Shaheed CV.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Shaheed CV.exe.logJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeFile created: C:\Users\user\AppData\Local\Temp\tmp622.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@20/12@13/2
Source: Shaheed CV.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\Shaheed CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4872:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1788:120:WilError_01
Source: C:\Users\user\Desktop\Shaheed CV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{99bdd317-26d2-4098-abcb-4bff156f262b}
Source: C:\Users\user\Desktop\Shaheed CV.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 1.0.Shaheed CV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 1.0.Shaheed CV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 1.0.Shaheed CV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\Shaheed CV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Shaheed CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Shaheed CV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 1.0.Shaheed CV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 1.0.Shaheed CV.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_0755EFD0 push eax; ret 1_2_0755EFD1
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_0755F06A pushfd ; ret 1_2_0755F071
Source: initial sampleStatic PE information: section name: .text entropy: 7.048102143625597
Source: initial sampleStatic PE information: section name: .text entropy: 7.048102143625597
Source: 1.0.Shaheed CV.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 1.0.Shaheed CV.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\user\Desktop\Shaheed CV.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\Shaheed CV.exeFile opened: C:\Users\user\Desktop\Shaheed CV.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: 00000009.00000002.363499136.0000000002A7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.268171209.000000000276B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5336, type: MEMORYSTR
Source: Shaheed CV.exe, 00000000.00000002.268171209.000000000276B000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000007.00000002.361327545.00000000033AB000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.363499136.0000000002A7B000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: Shaheed CV.exe, 00000000.00000002.268171209.000000000276B000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000007.00000002.361327545.00000000033AB000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.363499136.0000000002A7B000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239702s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239592s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239483s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239374s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239263s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239134s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -239000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -238839s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -238703s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -238588s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -238476s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -238348s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -238199s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -238060s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237931s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237827s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237703s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237593s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237480s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237343s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -237085s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236969s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236734s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236609s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236484s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236372s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236230s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236109s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -236000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235890s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235665s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235560s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235451s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235327s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235218s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -235109s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234984s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234857s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234749s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234503s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234344s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -234092s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -233968s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1100Thread sleep time: -233827s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 3084Thread sleep time: -7378697629483816s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -239657s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -239344s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -239141s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -239000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -238871s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -238750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -238453s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -238342s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -238000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -237889s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -237761s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -237635s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -237515s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -237402s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -237249s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -237122s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -236935s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -236780s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -236669s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -236539s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -236297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -236142s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -236000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -235844s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -235719s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -235584s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -235391s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -235250s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -235094s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -234981s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -234859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -234750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -234620s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -234494s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -234368s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -233594s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -233413s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -232706s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -232500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -232297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -232166s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -230750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -230594s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -230341s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -230203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -230062s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -229950s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -229840s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -229704s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -229500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -229364s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -229157s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -229008s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -228890s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -228704s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -228574s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -228469s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -228341s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -228211s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -228047s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -227907s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -227750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 5112Thread sleep time: -227594s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5360Thread sleep count: 9558 > 30Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -239750s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -239640s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -239531s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -239372s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -239248s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -239121s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -238937s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -238702s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -238297s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -238164s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -238047s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -237828s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -237675s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -237500s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -237276s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -237156s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -236937s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -236641s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -236516s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -236391s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -236281s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -236153s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -236043s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -235844s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -235687s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -235559s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -235391s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -235250s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -235040s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -234250s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -234094s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -233000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -231437s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -231310s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -231181s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -231062s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230891s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230763s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230652s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230547s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230436s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230294s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230169s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -230000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -229680s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -229438s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -229250s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -229140s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -229000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -228827s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -228688s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -228547s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -228387s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -228249s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227980s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227826s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227671s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227514s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227398s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227276s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227141s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5324Thread sleep time: -227000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1332Thread sleep count: 9469 > 30Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -239813s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -239563s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -239288s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -239063s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -238810s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -238698s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -238559s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -238360s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -238110s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -237953s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -237703s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -237500s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -237360s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -237063s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -236937s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -236828s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -236693s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -236500s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -236360s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -236156s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -235952s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -235810s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -235688s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -235453s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -235297s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -235110s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -234906s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -234764s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -234610s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -234441s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -234312s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -234058s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -233750s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -233500s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -233250s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -233110s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -232984s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -232855s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -232703s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -232500s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -232340s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -232226s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -232109s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -231907s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -231750s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -231597s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -231453s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -231308s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -231142s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -230999s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -230826s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -230610s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -230468s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -230343s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -230228s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -230053s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -229906s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -229750s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -229610s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -229453s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -229280s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -229171s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -229058s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -228950s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1324Thread sleep time: -228828s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exe TID: 1572Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2968Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1412Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239859Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239702Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239592Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239483Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239374Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239263Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239134Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238839Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238703Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238588Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238476Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238348Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238199Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238060Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237931Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237827Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237703Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237593Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237480Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237343Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237203Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237085Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236969Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236859Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236734Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236609Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236484Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236372Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236230Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236109Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235890Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235781Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235665Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235560Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235451Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235327Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235218Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235109Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234984Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234857Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234749Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234640Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234503Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234344Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234203Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234092Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233968Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233827Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239657Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239344Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239141Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238871Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238453Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238342Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237889Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237761Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237635Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237515Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237402Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237249Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237122Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236935Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236780Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236669Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236539Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236297Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236142Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235844Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235719Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235584Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235391Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235250Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235094Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234981Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234859Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234620Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234494Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234368Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233594Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233413Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232706Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232500Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232297Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232166Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230594Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230341Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230203Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230062Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229950Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229840Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229704Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229500Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229364Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229157Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229008Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228890Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228704Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228574Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228469Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228341Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228211Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228047Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 227907Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 227750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 227594Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239640Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239531Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239372Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239248Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239121Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238937Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238702Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238297Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238164Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238047Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237828Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237675Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237276Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237156Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236937Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236641Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236516Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236391Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236281Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236153Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236043Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235844Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235687Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235559Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235391Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235040Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234094Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231437Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231310Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231181Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231062Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230891Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230763Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230652Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230547Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230436Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230294Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230169Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229680Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229438Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229140Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228827Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228688Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228547Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228387Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228249Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227980Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227826Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227671Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227514Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227398Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227276Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227141Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239813Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239563Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239288Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239063Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238810Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238698Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238559Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238360Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238110Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237953Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237703Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237360Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237063Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236937Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236828Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236693Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236360Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236156Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235952Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235810Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235688Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235453Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235297Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235110Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234906Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234764Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234610Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234441Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234312Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234058Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233110Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232984Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232855Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232703Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232340Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232226Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232109Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231907Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231597Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231453Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231308Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231142Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230999Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230826Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230610Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230468Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230343Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230228Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230053Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229906Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229610Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229453Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229280Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229171Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229058Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228950Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228828Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\Shaheed CV.exeWindow / User API: threadDelayed 8855Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeWindow / User API: threadDelayed 9627Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeWindow / User API: foregroundWindowGot 572Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeWindow / User API: foregroundWindowGot 479Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeWindow / User API: threadDelayed 9641Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWindow / User API: threadDelayed 9558Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWindow / User API: threadDelayed 9469Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239859Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239702Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239592Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239483Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239374Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239263Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239134Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238839Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238703Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238588Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238476Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238348Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238199Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238060Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237931Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237827Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237703Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237593Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237480Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237343Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237203Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237085Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236969Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236859Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236734Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236609Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236484Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236372Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236230Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236109Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235890Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235781Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235665Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235560Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235451Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235327Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235218Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235109Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234984Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234857Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234749Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234640Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234503Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234344Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234203Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234092Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233968Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233827Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239657Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239344Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239141Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 239000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238871Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238453Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238342Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 238000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237889Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237761Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237635Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237515Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237402Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237249Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 237122Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236935Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236780Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236669Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236539Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236297Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236142Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 236000Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235844Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235719Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235584Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235391Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235250Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 235094Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234981Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234859Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234620Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234494Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 234368Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233594Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 233413Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232706Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232500Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232297Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 232166Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230594Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230341Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230203Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 230062Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229950Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229840Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229704Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229500Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229364Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229157Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 229008Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228890Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228704Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228574Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228469Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228341Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228211Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 228047Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 227907Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 227750Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 227594Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239640Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239531Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239372Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239248Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239121Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238937Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238702Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238297Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238164Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238047Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237828Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237675Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237276Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237156Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236937Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236641Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236516Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236391Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236281Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236153Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236043Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235844Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235687Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235559Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235391Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235040Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234094Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231437Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231310Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231181Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231062Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230891Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230763Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230652Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230547Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230436Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230294Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230169Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229680Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229438Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229140Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228827Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228688Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228547Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228387Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228249Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227980Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227826Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227671Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227514Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227398Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227276Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227141Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 227000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 240000Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239813Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239563Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239288Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 239063Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238810Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238698Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238559Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238360Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 238110Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237953Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237703Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237360Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 237063Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236937Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236828Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236693Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236360Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 236156Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235952Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235810Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235688Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235453Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235297Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 235110Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234906Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234764Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234610Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234441Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234312Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 234058Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233250Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 233110Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232984Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232855Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232703Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232500Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232340Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232226Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 232109Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231907Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231597Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231453Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231308Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 231142Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230999Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230826Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230610Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230468Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230343Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230228Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 230053Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229906Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229750Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229610Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229453Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229280Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229171Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 229058Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228950Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 228828Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 0000000F.00000002.379850214.0000000002D9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: Shaheed CV.exe, 00000001.00000002.508778046.0000000000E54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Shaheed CV.exeMemory written: C:\Users\user\Desktop\Shaheed CV.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeMemory written: C:\Users\user\Desktop\Shaheed CV.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Users\user\Desktop\Shaheed CV.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmpJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA49.tmpJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeProcess created: C:\Users\user\Desktop\Shaheed CV.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: Shaheed CV.exe, 00000001.00000002.541900523.000000000752C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Managert
Source: Shaheed CV.exe, 00000001.00000002.524134831.000000000330B000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.543281603.00000000090AC000.00000004.00000010.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.523546334.00000000032AF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: Shaheed CV.exe, 00000001.00000002.524134831.000000000330B000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.523546334.00000000032AF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.518686748.0000000002F9B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager(h
Source: Shaheed CV.exe, 00000001.00000002.539650399.0000000006A0C000.00000004.00000010.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.536752502.00000000061BB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managert@
Source: Shaheed CV.exe, 00000001.00000002.518000484.0000000002F30000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHa
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Users\user\Desktop\Shaheed CV.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Users\user\Desktop\Shaheed CV.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Users\user\Desktop\Shaheed CV.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Users\user\Desktop\Shaheed CV.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\Shaheed CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\Shaheed CV.exeCode function: 1_2_07552590 GetSystemTimes,1_2_07552590
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Shaheed CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Shaheed CV.exe, 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Shaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Shaheed CV.exe, 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Shaheed CV.exe, 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Shaheed CV.exe, 00000001.00000002.524873341.0000000003D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Shaheed CV.exe, 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Shaheed CV.exe, 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Shaheed CV.exe, 00000001.00000003.291412562.0000000006698000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Shaheed CV.exe, 00000012.00000002.403654416.000000000400E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000012.00000002.403654416.000000000400E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKindDelegateDebuggerDisplayAttributeSystem
Source: Shaheed CV.exe, 00000012.00000002.403274871.0000000003FF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000012.00000002.403274871.0000000003FF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Shaheed CV.exe, 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Shaheed CV.exe, 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 1.0.Shaheed CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.Shaheed CV.exe.40195d0.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5554629.22.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47064ca.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.5550000.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.37e1550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.493fb5a.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e3df0.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.47e8419.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46f1e9d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.46e5c69.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4948fb9.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.Shaheed CV.exe.4944990.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Shaheed CV.exe.3950a00.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4896, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 4408, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Shaheed CV.exe PID: 3888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3192, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scheduled Task/Job
Boot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory111
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials13
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items2
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 713264 Sample: Shaheed CV.exe Startdate: 30/09/2022 Architecture: WINDOWS Score: 100 53 Snort IDS alert for network traffic 2->53 55 Multi AV Scanner detection for domain / URL 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 14 other signatures 2->59 8 Shaheed CV.exe 3 2->8         started        12 dhcpmon.exe 2 2->12         started        14 dhcpmon.exe 3 2->14         started        16 Shaheed CV.exe 2 2->16         started        process3 file4 47 C:\Users\user\AppData\...\Shaheed CV.exe.log, ASCII 8->47 dropped 63 Injects a PE file into a foreign processes 8->63 18 Shaheed CV.exe 1 16 8->18         started        23 dhcpmon.exe 12->23         started        25 dhcpmon.exe 12->25         started        27 dhcpmon.exe 14->27         started        29 Shaheed CV.exe 2 16->29         started        signatures5 process6 dnsIp7 49 xp230522.ddns.net 171.22.30.56, 1996, 49708, 49709 CMCSUS Germany 18->49 51 192.168.2.1 unknown unknown 18->51 39 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->39 dropped 41 C:\Users\user\AppData\Roaming\...\run.dat, data 18->41 dropped 43 C:\Users\user\AppData\Local\Temp\tmp622.tmp, XML 18->43 dropped 45 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->45 dropped 61 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->61 31 schtasks.exe 1 18->31         started        33 schtasks.exe 1 18->33         started        file8 signatures9 process10 process11 35 conhost.exe 31->35         started        37 conhost.exe 33->37         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Shaheed CV.exe100%AviraHEUR/AGEN.1250538
Shaheed CV.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraHEUR/AGEN.1250538
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLinkDownload
0.0.Shaheed CV.exe.2d0000.0.unpack100%AviraHEUR/AGEN.1250538Download File
1.0.Shaheed CV.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
1.2.Shaheed CV.exe.5550000.21.unpack100%AviraTR/NanoCore.fadteDownload File
SourceDetectionScannerLabelLink
xp230522.ddns.net12%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.carterandcone.comTC0%URL Reputationsafe
http://www.carterandcone.comTC0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.comlic0%URL Reputationsafe
http://www.carterandcone.comt0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.com0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.fontbureau.comgrita0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.typography.net0%URL Reputationsafe
http://www.monotype.0%URL Reputationsafe
http://www.carterandcone.com80%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.fontbureau.comce0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.de0%URL Reputationsafe
http://www.urwpp.de0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.typography.netnl40%Avira URL Cloudsafe
http://www.typography.netz10%Avira URL Cloudsafe
http://www.carterandcone.comatt0%Avira URL Cloudsafe
http://www.fontbureau.comm30%Avira URL Cloudsafe
http://www.carterandcone.comionq0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
xp230522.ddns.net
171.22.30.56
truetrueunknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246140536.0000000005BE6000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designersGShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designers/?Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.carterandcone.comTCShaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers?Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.tiro.comShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.tiro.comlicShaheed CV.exe, 00000000.00000003.247267273.0000000005BF1000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247349700.0000000005BF3000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.carterandcone.comtShaheed CV.exe, 00000000.00000003.246787210.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.goodfont.co.krShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://google.comShaheed CV.exe, 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Shaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.carterandcone.comShaheed CV.exe, 00000000.00000003.246864672.0000000005BDF000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246787210.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comionqShaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.carterandcone.comlShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comShaheed CV.exe, 00000000.00000003.245029512.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245241266.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246415982.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243346345.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243198416.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246155308.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.242673254.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245415325.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.244376932.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.244305278.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247562154.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243411948.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245719163.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245160199.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245492602.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.242939851.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.241882169.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.244760078.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.245671794.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247710170.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.247216864.0000000005BEB000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/cabarga.htmlNShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/cTheShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmShaheed CV.exe, 00000000.00000003.249427675.0000000005BF0000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comgritaShaheed CV.exe, 00000000.00000003.263486813.0000000005BD0000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frere-jones.htmlShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.typography.netnl4Shaheed CV.exe, 00000000.00000003.243437245.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243362658.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.typography.netShaheed CV.exe, 00000000.00000003.243437245.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243362658.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.monotype.Shaheed CV.exe, 00000000.00000003.248783937.0000000005BE7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.com8Shaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comattShaheed CV.exe, 00000000.00000003.247106372.0000000005BD9000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.246856571.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers8Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comceShaheed CV.exe, 00000000.00000003.263486813.0000000005BD0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comShaheed CV.exe, 00000000.00000003.242986910.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sandoll.co.krShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleaseShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deShaheed CV.exe, 00000000.00000003.249141608.0000000005BF3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnShaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameShaheed CV.exe, 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sakkal.comShaheed CV.exe, 00000000.00000003.248315965.0000000005BF2000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000002.283946896.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comm3Shaheed CV.exe, 00000000.00000003.263486813.0000000005BD0000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.typography.netz1Shaheed CV.exe, 00000000.00000003.243437245.0000000005BF3000.00000004.00000800.00020000.00000000.sdmp, Shaheed CV.exe, 00000000.00000003.243362658.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          171.22.30.56
                          xp230522.ddns.netGermany
                          33657CMCSUStrue
                          IP
                          192.168.2.1
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:713264
                          Start date and time:2022-09-30 09:24:16 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 5s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:Shaheed CV.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:24
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@20/12@13/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 47
                          • Number of non-executed functions: 3
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                          TimeTypeDescription
                          09:25:11API Interceptor1031x Sleep call for process: Shaheed CV.exe modified
                          09:25:30AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          09:25:32Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\Shaheed CV.exe" s>$(Arg0)
                          09:25:33Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                          09:25:38API Interceptor261x Sleep call for process: dhcpmon.exe modified
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          xp230522.ddns.net114512-08-22.exeGet hashmaliciousBrowse
                          • 107.182.129.51
                          SecuriteInfo.com.W32.AIDetectNet.01.27415.exeGet hashmaliciousBrowse
                          • 107.182.129.51
                          SecuriteInfo.com.W32.AIDetectNet.01.25602.exeGet hashmaliciousBrowse
                          • 107.182.129.51
                          SecuriteInfo.com.Trojan.PWS.Siggen3.20355.7808.exeGet hashmaliciousBrowse
                          • 107.182.129.51
                          817260722.exeGet hashmaliciousBrowse
                          • 107.182.129.51
                          SecuriteInfo.com.W32.AIDetectNet.01.24251.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          RFQ.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          112_12_07_22.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          SecuriteInfo.com.W32.AIDetectNet.01.24438.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          INVOICE_.EXEGet hashmaliciousBrowse
                          • 212.192.246.194
                          510_0107_2022.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          SecuriteInfo.com.Trojan.PackedNET.1400.30765.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          SecuriteInfo.com.W32.AIDetectNet.01.5321.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          Swift.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          Specifications.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          0932062722.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          PO101.exeGet hashmaliciousBrowse
                          • 37.0.8.138
                          SecuriteInfo.com.W32.AIDetectNet.01.17169.exeGet hashmaliciousBrowse
                          • 37.0.8.138
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          CMCSUSfile.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          SecuriteInfo.com.Win32.PWSX-gen.17272.exeGet hashmaliciousBrowse
                          • 81.161.229.75
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          file.exeGet hashmaliciousBrowse
                          • 171.22.30.106
                          No context
                          No context
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):963584
                          Entropy (8bit):7.045024334823116
                          Encrypted:false
                          SSDEEP:12288:Z9F2iNf2kIE8Jk84Hr7KYuzfUGCfA1s5DL8cCG1ADqjJ5npVNFDlnl/9yHWWDdjI:Z9F1A28KrHuDwIs5DoFwjrp7
                          MD5:BEA958C83D0AA73CDF2C72485C4D2FE8
                          SHA1:FFC8E9E84A7B7CB625BFEBD041CE39EC0F20C573
                          SHA-256:3507DD4118B87DCECB315684892DF75AF68BCFA1860A10F17309A76FECC45FDA
                          SHA-512:4E045FAC70205FDB6E872FCDA7E56AAD993941C4B95B1EC468D9FEC2281EBDFD7855DD67D2479C520FA029F5911007BF9B84DD501D0F9A9262097FF96B4EBA6F
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$6c..............P.............N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...T.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................0.......H.......x...................h;...........................................0..........*....0...........(!...*..0..:.........("... ..J. .e..a%..^E................+... ...JZ .Y-.a+.*...0..3.......s#........s$........s%........s&........s'........*..0..R........ .9.8 ....a%..^E................+...+)~....o(..... .A,.Z ..-ia+.. J..Z z."<a+..*...0...........~....o)....+..*.0..?........ >6.. jg.a%..^E................+.~....o*..... .K*0Z .?qxa+..*..0..R........ .... P...a%..^E.......
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview:[ZoneTransfer]....ZoneId=0
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1302
                          Entropy (8bit):5.3499841584777394
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4Ks2E1qE4x84bE4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxvbHKnYHKhQnoPtHoxH5
                          MD5:A7D610296B11732FD61A88BC218783AC
                          SHA1:EE89E72AF3A15DAB847055A9F9F88FD934113857
                          SHA-256:7F3A7CE69B42D8C832F0FBB57C0523D6F098DC090D39616C05277F8DB9F4F9E9
                          SHA-512:8C0AC1893FF0A7FE287D4FC650943D33D1546200A89C2A502FE9BCB11DA6227533FD8F966EE8651B7E7BD8B5EA11403AD930D022D1D75B3EAA6D24D625F779DF
                          Malicious:true
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configu
                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1302
                          Entropy (8bit):5.3499841584777394
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4Ks2E1qE4x84bE4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxvbHKnYHKhQnoPtHoxH5
                          MD5:A7D610296B11732FD61A88BC218783AC
                          SHA1:EE89E72AF3A15DAB847055A9F9F88FD934113857
                          SHA-256:7F3A7CE69B42D8C832F0FBB57C0523D6F098DC090D39616C05277F8DB9F4F9E9
                          SHA-512:8C0AC1893FF0A7FE287D4FC650943D33D1546200A89C2A502FE9BCB11DA6227533FD8F966EE8651B7E7BD8B5EA11403AD930D022D1D75B3EAA6D24D625F779DF
                          Malicious:false
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configu
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1303
                          Entropy (8bit):5.0924615710771945
                          Encrypted:false
                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Vjxtn:cbk4oL600QydbQxIYODOLedq3Aj
                          MD5:57ADC3F498DD2E5CEDACBB93631B9DBB
                          SHA1:7B2CD955158450E54A3893B7FC6095CB9AFAE3C2
                          SHA-256:88A10070973EF061C759B38CBE2B4D340C212F339F9908433EC80C4E06DFB452
                          SHA-512:6B9486892D5E95FD7CD69F3CADDA088C51035964DF006D5FC0C76A723EEF9C4069A135DA1CD7B8BE9E678623E593A55F024406CAAB8E3835E41BF90B6053BE72
                          Malicious:true
                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1310
                          Entropy (8bit):5.109425792877704
                          Encrypted:false
                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):232
                          Entropy (8bit):7.089541637477408
                          Encrypted:false
                          SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                          MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                          SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                          SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                          SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                          Malicious:false
                          Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):8
                          Entropy (8bit):3.0
                          Encrypted:false
                          SSDEEP:3:/wn:4n
                          MD5:66EEC7A60774BCB87036543EC7E6CFB3
                          SHA1:1D212CFCAC4A107509E3842D3AC582E8D0A47389
                          SHA-256:65AA53AC9D9F95F29D8E729EA381FCF0CD7FBE6D33B781A75A20F40D1B8BF85D
                          SHA-512:BEAB58975341938C9A52E953D81D61C6801B791F2892D4C2B4CB720293779102B6488E748DCC20C9CD287D2A6084EE10051D1F3A9AF3FDA9D93BDA48A60BDE68
                          Malicious:true
                          Preview:...c...H
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:data
                          Category:modified
                          Size (bytes):24
                          Entropy (8bit):4.501629167387823
                          Encrypted:false
                          SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                          MD5:ACD3FB4310417DC77FE06F15B0E353E6
                          SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                          SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                          SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                          Malicious:false
                          Preview:9iH...}Z.4..f..J".C;"a
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):40
                          Entropy (8bit):5.153055907333276
                          Encrypted:false
                          SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                          MD5:4E5E92E2369688041CC82EF9650EDED2
                          SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                          SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                          SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                          Malicious:false
                          Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):327768
                          Entropy (8bit):7.999367066417797
                          Encrypted:true
                          SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                          MD5:2E52F446105FBF828E63CF808B721F9C
                          SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                          SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                          SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                          Malicious:false
                          Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                          Process:C:\Users\user\Desktop\Shaheed CV.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):40
                          Entropy (8bit):4.0898227820087545
                          Encrypted:false
                          SSDEEP:3:oNN2+W2NJAdA:oNN2R2NJ4A
                          MD5:3D9A0CF6C1DC714EFD0C4CFE300C88B0
                          SHA1:32EA3A91BF0D7628F785053F425EAF7AF2B08E80
                          SHA-256:AAFFF1075FAC84B2533F6605F2FC353CB973A720301DB9CC5B0EC84A11FAD6D3
                          SHA-512:9C00C8F4BDFCD2789DC8F7C27963BFC731246F9143B6EF69CA6C5CEB6509F349E0FFDED01F4118D9C7EAC34814156E01D1C17686A0E486E3E270C709CEDA8C34
                          Malicious:false
                          Preview:C:\Users\user\Desktop\Shaheed CV.exe
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.045024334823116
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:Shaheed CV.exe
                          File size:963584
                          MD5:bea958c83d0aa73cdf2c72485c4d2fe8
                          SHA1:ffc8e9e84a7b7cb625bfebd041ce39ec0f20c573
                          SHA256:3507dd4118b87dcecb315684892df75af68bcfa1860a10f17309a76fecc45fda
                          SHA512:4e045fac70205fdb6e872fcda7e56aad993941c4b95b1ec468d9fec2281ebdfd7855dd67d2479c520fa029f5911007bf9b84dd501d0f9a9262097ff96b4eba6f
                          SSDEEP:12288:Z9F2iNf2kIE8Jk84Hr7KYuzfUGCfA1s5DL8cCG1ADqjJ5npVNFDlnl/9yHWWDdjI:Z9F1A28KrHuDwIs5DoFwjrp7
                          TLSH:FD253A2835E6715DF477CAB58FD8BCFA8C5AF672121B61B720A313498B2ED46CE90071
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$6c..............P.............N.... ........@.. ....................................@................................
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0x4ebc4e
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x633624A2 [Thu Sep 29 23:05:06 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xebbf80x53.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xec0000x11e8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xe9c540xe9e00False0.6566289333912346data7.048102143625597IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xec0000x11e80x1200False0.3947482638888889data5.061129706077646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xee0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0xec0a00x330data
                          RT_MANIFEST0xec3d00xe15XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          192.168.2.6171.22.30.564971319962816766 09/30/22-09:26:24.690008TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497131996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564970819962816766 09/30/22-09:25:36.584358TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497081996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564971119962816766 09/30/22-09:26:05.851073TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497111996192.168.2.6171.22.30.56
                          171.22.30.56192.168.2.61996497092841753 09/30/22-09:25:50.769492TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)199649709171.22.30.56192.168.2.6
                          192.168.2.6171.22.30.564971519962816766 09/30/22-09:26:38.673509TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497151996192.168.2.6171.22.30.56
                          171.22.30.56192.168.2.61996497102810290 09/30/22-09:25:57.326283TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1199649710171.22.30.56192.168.2.6
                          192.168.2.6171.22.30.564971719962816766 09/30/22-09:26:53.127416TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497171996192.168.2.6171.22.30.56
                          171.22.30.56192.168.2.61996497202841753 09/30/22-09:27:34.295512TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)199649720171.22.30.56192.168.2.6
                          192.168.2.6171.22.30.564971919962816766 09/30/22-09:27:08.238198TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497191996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564971219962816766 09/30/22-09:26:16.947839TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497121996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564970919962816766 09/30/22-09:25:48.107989TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497091996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564971019962816766 09/30/22-09:25:57.843394TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497101996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564971219962816718 09/30/22-09:26:15.388652TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497121996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564971619962816766 09/30/22-09:26:46.628726TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497161996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564971419962816766 09/30/22-09:26:32.573764TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497141996192.168.2.6171.22.30.56
                          192.168.2.6171.22.30.564971819962816766 09/30/22-09:27:02.115598TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497181996192.168.2.6171.22.30.56
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 30, 2022 09:25:33.234627008 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:33.262355089 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:33.262487888 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:33.633117914 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:33.680071115 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:33.728622913 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:33.755914927 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:33.885895967 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.166496038 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.244942904 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.390378952 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.468950033 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.488816977 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.488886118 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.488930941 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.488976955 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.488980055 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.489105940 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.515928984 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.515988111 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.516031981 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.516074896 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.516118050 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.516132116 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.516132116 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.516165018 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.516207933 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.516238928 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.516251087 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.519078016 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.543361902 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543416977 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543476105 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543575048 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.543590069 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543642044 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543694973 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.543736935 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543781042 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543826103 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543860912 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.543868065 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543911934 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543956995 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.543960094 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.543960094 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.544002056 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.544394970 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.546087980 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.546135902 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.546185017 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.546196938 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.546228886 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.547785997 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.570976973 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571042061 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571072102 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571105957 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571135998 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571166039 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571194887 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571223974 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571254015 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571283102 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571310997 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571337938 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571409941 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.571510077 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.571819067 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571876049 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571929932 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.571964025 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572014093 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572025061 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.572025061 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.572067022 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572108984 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572149992 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572196007 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572213888 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.572242975 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572288990 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572329998 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.572402000 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.573009968 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.573059082 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.573081970 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.573101997 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.573143005 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.573204994 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.573254108 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.574686050 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.574734926 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.574774981 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.574815035 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.574918985 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.574918985 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598248959 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598292112 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598332882 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598340988 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598372936 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598412991 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598453045 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598494053 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598494053 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598494053 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598534107 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598572969 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598609924 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598649025 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598649979 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598649979 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598689079 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598727942 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598766088 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598803997 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598804951 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598804951 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598845005 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598897934 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598917961 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.598946095 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.598987103 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599023104 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599087000 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599087000 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599189997 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599231005 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599268913 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599307060 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599344015 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599374056 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599374056 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599383116 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599421978 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599458933 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599493980 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599524021 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599524021 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599530935 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599569082 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599606991 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599642038 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599647045 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599647045 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599680901 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599716902 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599751949 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599786997 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599806070 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599806070 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599828959 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599867105 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599903107 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.599941969 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.599941969 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.600035906 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.600097895 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.600136042 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.600174904 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.600210905 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.600248098 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.600258112 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.600259066 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.600892067 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.601742029 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.601769924 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.601788998 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.601811886 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.601974964 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.626084089 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626125097 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626159906 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626168966 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.626192093 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626224995 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626262903 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.626823902 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626858950 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626909971 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626924992 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.626943111 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.626976013 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627007008 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627038956 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627048969 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627048969 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627070904 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627099991 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627104998 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627139091 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627173901 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627207994 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627216101 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627216101 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627239943 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627271891 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627302885 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627334118 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627346992 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627346992 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627367020 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627399921 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627430916 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627451897 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627463102 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627496004 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627526999 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627545118 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627559900 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627568007 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627590895 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627608061 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627623081 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627655983 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627701998 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627732992 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627749920 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627749920 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627768993 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627801895 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627834082 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627865076 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627876997 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627876997 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.627897024 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627931118 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627963066 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.627995968 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628006935 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.628006935 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.628027916 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628058910 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628092051 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628123999 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628134966 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.628134966 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.628160000 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628343105 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.628829002 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628863096 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628895044 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628927946 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.628961086 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.629282951 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.654295921 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.654335022 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.654372931 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.654407978 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.654443026 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.654500961 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.654500961 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.654961109 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.654998064 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655090094 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655123949 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655150890 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655162096 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.655186892 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655221939 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655277967 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.655277967 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.655561924 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655600071 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655638933 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655677080 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655714035 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655744076 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.655744076 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.655749083 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655785084 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655797958 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.655852079 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655889988 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655925035 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655934095 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.655960083 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.655994892 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656030893 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656047106 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656048059 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656068087 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656105042 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656141996 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656178951 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656215906 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656239033 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656239033 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656251907 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656287909 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656306982 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656323910 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656358004 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656392097 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656405926 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656405926 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656455040 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656490088 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656526089 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656559944 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656570911 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656570911 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656595945 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656630039 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656662941 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656698942 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656708956 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656708956 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656733990 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656769991 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656805038 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656820059 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656838894 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656847954 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656873941 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656908989 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656943083 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.656960964 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.656977892 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657013893 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657048941 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657084942 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657097101 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.657097101 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.657120943 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657155991 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657160997 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.657298088 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657334089 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657368898 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657377958 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.657377958 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.657402992 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657437086 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657469988 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657505035 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657512903 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.657514095 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.657538891 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.657834053 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.681546926 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.681597948 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.681647062 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.681693077 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.681762934 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.681791067 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.681835890 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.681978941 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.682251930 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682307005 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682336092 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.682353020 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682394028 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.682395935 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682439089 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682482004 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682493925 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.682527065 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682564974 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.682573080 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.682735920 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.684391975 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684474945 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684520006 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684564114 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684607983 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684609890 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.684650898 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684653997 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.684695959 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684721947 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.684740067 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684782982 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684825897 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684827089 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.684870005 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684910059 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.684914112 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684957027 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.684999943 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685039997 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685039997 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685045004 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685086966 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685131073 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685189009 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685233116 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685237885 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685239077 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685276031 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685321093 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685364962 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685365915 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685442924 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685486078 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685551882 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685595036 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685596943 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685596943 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685640097 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685695887 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685723066 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685739994 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685784101 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685798883 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685828924 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685834885 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.685873985 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685919046 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.685964108 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686007977 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686009884 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.686009884 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.686052084 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686094046 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686136961 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686175108 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.686175108 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:34.686182976 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686227083 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686268091 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:34.686398983 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:35.496073961 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:35.575017929 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:36.584357977 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:36.662467003 CEST199649708171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:38.145510912 CEST497081996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:45.711679935 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:45.739135981 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:45.739321947 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:46.938990116 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:46.975240946 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:47.104502916 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:47.132298946 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:47.132431030 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:47.212999105 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:47.213129044 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:47.295016050 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:47.404966116 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:47.592657089 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:47.620035887 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:47.699559927 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:48.028882980 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:48.107927084 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:48.107989073 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:48.179063082 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:48.186872959 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:48.214359999 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:48.214946985 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:48.242445946 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:48.293417931 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:50.478924990 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:50.554124117 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:50.769491911 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:50.814347029 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:50.891998053 CEST199649709171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:50.921605110 CEST497091996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.122454882 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.150075912 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:56.150248051 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.190265894 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.230983019 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:56.387742043 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.398718119 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.426604986 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:56.460733891 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.538992882 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:56.539088011 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.618016005 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:56.651834011 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:56.652792931 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.681374073 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:56.887820005 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:56.915239096 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:57.002428055 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:57.032526016 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:57.075364113 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:57.298491955 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:57.326282978 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:57.372351885 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:57.843394041 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:57.921099901 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:57.940983057 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:25:58.022084951 CEST199649710171.22.30.56192.168.2.6
                          Sep 30, 2022 09:25:58.654829025 CEST497101996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:02.879312992 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:02.906392097 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:02.906630039 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:02.943754911 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:02.981583118 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:02.981739998 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:03.062314987 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:03.294997931 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:03.322371006 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:03.355987072 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:03.434156895 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:03.535753012 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:03.607188940 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:03.634454012 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:03.794713020 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:04.153923988 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:04.231136084 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:04.231327057 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:04.258749962 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:04.258842945 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:04.286149979 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:04.364993095 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:04.442075968 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:05.851073027 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:05.936100006 CEST199649711171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:07.528548956 CEST497111996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:14.663999081 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:14.691143036 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:14.691242933 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:14.964328051 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:15.004750967 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:15.108089924 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:15.340791941 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:15.368311882 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:15.388652086 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:15.459163904 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:15.549674988 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:15.627165079 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:15.742419004 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:15.905064106 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:15.932204962 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:15.938695908 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:16.016947031 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:16.226684093 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:16.254028082 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:16.405112028 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:16.712650061 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:16.739934921 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:16.795732021 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:16.947839022 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:17.025077105 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:17.209641933 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:17.273375034 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:17.286900043 CEST199649712171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:17.287067890 CEST497121996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:21.927687883 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:21.955101013 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:21.955255985 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:21.955769062 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:22.002620935 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.032516956 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:22.060383081 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.098784924 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:22.178179026 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.304683924 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.483730078 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:22.511027098 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.658164978 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:22.735136032 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.735236883 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:22.762844086 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.874388933 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:22.901741982 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:22.983737946 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:24.690007925 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:24.778218031 CEST199649713171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:25.578604937 CEST497131996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:31.245448112 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:31.272775888 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:31.272938013 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:31.649156094 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:31.687901020 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:31.797015905 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:31.945611954 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.023123026 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:32.023257971 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.050981998 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:32.109523058 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.250684023 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.329224110 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:32.434410095 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:32.435523987 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.464864016 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:32.465898037 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.493603945 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:32.494281054 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.525031090 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:32.573764086 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:32.652945995 CEST199649714171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:33.579483032 CEST497141996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.036104918 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.063113928 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.063316107 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.064795017 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.112842083 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.113327980 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.142518997 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.188461065 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.202107906 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.284769058 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.372014046 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.373593092 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.400475025 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.445327044 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.472220898 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.472615957 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.499427080 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.499592066 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.526720047 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:38.579010963 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.673508883 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:38.750797987 CEST199649715171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:40.321849108 CEST497151996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.395054102 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.422354937 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.422579050 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.423224926 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.458221912 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.458554029 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.486134052 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.517020941 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.592127085 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.626724005 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.704092026 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.720856905 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.722023010 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.749412060 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.798218012 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.825548887 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.825963974 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.853703022 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.853882074 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.881469965 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:45.881611109 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:45.966042995 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:46.628726006 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:46.708204031 CEST199649716171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:47.640925884 CEST497161996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.438688993 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.465806007 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.466022015 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.466775894 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.502239943 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.503072977 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.530602932 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.580015898 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.667260885 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.740113974 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.858436108 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.892256021 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.919395924 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.920449972 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.948124886 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.948237896 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:52.975613117 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:52.975766897 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:53.052050114 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:53.127415895 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:53.205151081 CEST199649717171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:55.149348974 CEST497171996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:59.775042057 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:59.802064896 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:59.802262068 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:59.830158949 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:59.866056919 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:59.866178989 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:59.938373089 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:26:59.938632965 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:26:59.967027903 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:00.018232107 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.152589083 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.230077982 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:01.351083040 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.429486990 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:01.549498081 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:01.550441027 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.588020086 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:01.690119028 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.719475031 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:01.826204062 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.853696108 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:01.853909969 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.881428957 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:01.881565094 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:01.961074114 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:02.115597963 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:02.196995974 CEST199649718171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:03.199564934 CEST497181996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.257446051 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.285047054 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.285171032 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.285624981 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.324234009 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.324748039 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.352694035 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.381261110 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.464154005 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.553467989 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.558609009 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.634315014 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.675040007 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.702662945 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.703068018 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.730745077 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.730868101 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:07.758780956 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:07.800007105 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:08.238198042 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:08.311160088 CEST199649719171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:09.960244894 CEST497191996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.037587881 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.065220118 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.065341949 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.066370010 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.101807117 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.102125883 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.130923033 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.162786007 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.241287947 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.341528893 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.341845989 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.369076014 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.386028051 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.415834904 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.416050911 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.443440914 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.443521976 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:14.470997095 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:14.519304037 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:19.094727039 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:19.144706964 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:22.358608007 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:22.410664082 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:24.295034885 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:24.348247051 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:29.294281006 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:29.348706961 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:30.384388924 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:30.426928997 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:34.295511961 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:34.349148035 CEST497201996192.168.2.6171.22.30.56
                          Sep 30, 2022 09:27:38.469690084 CEST199649720171.22.30.56192.168.2.6
                          Sep 30, 2022 09:27:38.521363020 CEST497201996192.168.2.6171.22.30.56
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 30, 2022 09:25:33.184674978 CEST4978653192.168.2.68.8.8.8
                          Sep 30, 2022 09:25:33.207154989 CEST53497868.8.8.8192.168.2.6
                          Sep 30, 2022 09:25:45.687932968 CEST5859553192.168.2.68.8.8.8
                          Sep 30, 2022 09:25:45.709033012 CEST53585958.8.8.8192.168.2.6
                          Sep 30, 2022 09:25:56.060213089 CEST5633153192.168.2.68.8.8.8
                          Sep 30, 2022 09:25:56.081578970 CEST53563318.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:02.849554062 CEST5050653192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:02.867027998 CEST53505068.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:14.230221987 CEST4944853192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:14.251580000 CEST53494488.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:21.867320061 CEST5908253192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:21.886611938 CEST53590828.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:30.778034925 CEST5950453192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:30.797499895 CEST53595048.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:38.012295008 CEST6519853192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:38.033260107 CEST53651988.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:45.374317884 CEST6291053192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:45.393697023 CEST53629108.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:52.416330099 CEST6386353192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:52.437509060 CEST53638638.8.8.8192.168.2.6
                          Sep 30, 2022 09:26:59.748965025 CEST6322953192.168.2.68.8.8.8
                          Sep 30, 2022 09:26:59.769763947 CEST53632298.8.8.8192.168.2.6
                          Sep 30, 2022 09:27:07.238698006 CEST6253853192.168.2.68.8.8.8
                          Sep 30, 2022 09:27:07.256422997 CEST53625388.8.8.8192.168.2.6
                          Sep 30, 2022 09:27:14.017038107 CEST5490353192.168.2.68.8.8.8
                          Sep 30, 2022 09:27:14.036518097 CEST53549038.8.8.8192.168.2.6
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Sep 30, 2022 09:25:33.184674978 CEST192.168.2.68.8.8.80x7831Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:25:45.687932968 CEST192.168.2.68.8.8.80x27adStandard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:25:56.060213089 CEST192.168.2.68.8.8.80xff18Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:02.849554062 CEST192.168.2.68.8.8.80xb4f5Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:14.230221987 CEST192.168.2.68.8.8.80x2013Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:21.867320061 CEST192.168.2.68.8.8.80x5eb5Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:30.778034925 CEST192.168.2.68.8.8.80x1e0fStandard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:38.012295008 CEST192.168.2.68.8.8.80x99cbStandard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:45.374317884 CEST192.168.2.68.8.8.80x74f9Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:52.416330099 CEST192.168.2.68.8.8.80xe708Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:59.748965025 CEST192.168.2.68.8.8.80x7232Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:27:07.238698006 CEST192.168.2.68.8.8.80x9a7bStandard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          Sep 30, 2022 09:27:14.017038107 CEST192.168.2.68.8.8.80x6fa1Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Sep 30, 2022 09:25:33.207154989 CEST8.8.8.8192.168.2.60x7831No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:25:45.709033012 CEST8.8.8.8192.168.2.60x27adNo error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:25:56.081578970 CEST8.8.8.8192.168.2.60xff18No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:02.867027998 CEST8.8.8.8192.168.2.60xb4f5No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:14.251580000 CEST8.8.8.8192.168.2.60x2013No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:21.886611938 CEST8.8.8.8192.168.2.60x5eb5No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:30.797499895 CEST8.8.8.8192.168.2.60x1e0fNo error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:38.033260107 CEST8.8.8.8192.168.2.60x99cbNo error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:45.393697023 CEST8.8.8.8192.168.2.60x74f9No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:52.437509060 CEST8.8.8.8192.168.2.60xe708No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:26:59.769763947 CEST8.8.8.8192.168.2.60x7232No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:27:07.256422997 CEST8.8.8.8192.168.2.60x9a7bNo error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false
                          Sep 30, 2022 09:27:14.036518097 CEST8.8.8.8192.168.2.60x6fa1No error (0)xp230522.ddns.net171.22.30.56A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:09:25:10
                          Start date:30/09/2022
                          Path:C:\Users\user\Desktop\Shaheed CV.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Shaheed CV.exe"
                          Imagebase:0x2d0000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.277482638.0000000003721000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.268171209.000000000276B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.278459244.000000000386E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low

                          Target ID:1
                          Start time:09:25:22
                          Start date:30/09/2022
                          Path:C:\Users\user\Desktop\Shaheed CV.exe
                          Wow64 process (32bit):true
                          Commandline:{path}
                          Imagebase:0x8a0000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540864195.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540406336.00000000070A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.541259921.0000000007120000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000000.262348704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.528777384.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.524873341.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.535928290.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.541719793.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.529484234.0000000004854000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.539874712.0000000006F10000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.530638518.000000000493F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.525868559.000000000460F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.535983394.0000000005550000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540641367.00000000070D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.541145410.0000000007110000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540517002.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540758776.00000000070E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540343328.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000003.291412562.0000000006698000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540584310.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.514850131.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low

                          Target ID:2
                          Start time:09:25:29
                          Start date:30/09/2022
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp622.tmp
                          Imagebase:0xbd0000
                          File size:185856 bytes
                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:3
                          Start time:09:25:30
                          Start date:30/09/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6da640000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:4
                          Start time:09:25:30
                          Start date:30/09/2022
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA49.tmp
                          Imagebase:0xbd0000
                          File size:185856 bytes
                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:5
                          Start time:09:25:31
                          Start date:30/09/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6da640000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:7
                          Start time:09:25:32
                          Start date:30/09/2022
                          Path:C:\Users\user\Desktop\Shaheed CV.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Shaheed CV.exe" 0
                          Imagebase:0xf80000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Reputation:low

                          Target ID:9
                          Start time:09:25:33
                          Start date:30/09/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                          Imagebase:0x650000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.363499136.0000000002A7B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          Reputation:low

                          Target ID:15
                          Start time:09:25:38
                          Start date:30/09/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                          Imagebase:0x820000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Reputation:low

                          Target ID:18
                          Start time:09:25:59
                          Start date:30/09/2022
                          Path:C:\Users\user\Desktop\Shaheed CV.exe
                          Wow64 process (32bit):true
                          Commandline:{path}
                          Imagebase:0xac0000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.403654416.000000000400E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.403274871.0000000003FF9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.404062131.0000000004024000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.400472140.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low

                          Target ID:19
                          Start time:09:26:00
                          Start date:30/09/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:{path}
                          Imagebase:0xe00000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.400787267.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low

                          Target ID:20
                          Start time:09:26:11
                          Start date:30/09/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):false
                          Commandline:{path}
                          Imagebase:0x280000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:low

                          Target ID:21
                          Start time:09:26:12
                          Start date:30/09/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:{path}
                          Imagebase:0x700000
                          File size:963584 bytes
                          MD5 hash:BEA958C83D0AA73CDF2C72485C4D2FE8
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Reputation:low

                          Reset < >

                            Execution Graph

                            Execution Coverage:13.8%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:2.5%
                            Total number of Nodes:202
                            Total number of Limit Nodes:10
                            execution_graph 22188 5aac5c8 22189 5aac5d6 22188->22189 22192 5aac612 22189->22192 22190 5aac606 22193 5aac64a 22192->22193 22194 5a052a0 2 API calls 22192->22194 22195 5a05290 2 API calls 22192->22195 22193->22190 22194->22193 22195->22193 22102 5a00366 22103 5a00377 22102->22103 22106 5a0ee00 22103->22106 22107 5a0ee17 22106->22107 22110 5a0e7ac 22107->22110 22111 5a0e7b7 22110->22111 22114 5a0e7bc 22111->22114 22113 5a003e4 22115 5a0e7c7 22114->22115 22116 5a0ef20 22115->22116 22120 5a0ef40 22115->22120 22124 5aa8c60 22115->22124 22116->22113 22117 5a0eeea 22117->22113 22121 5a0ef6f 22120->22121 22123 5a0f005 22121->22123 22129 5a0e810 22121->22129 22125 5aa8c87 22124->22125 22127 5aa8ea5 22125->22127 22128 5a0ef40 2 API calls 22125->22128 22126 5aa8ed9 22126->22117 22127->22117 22128->22126 22130 5a0e81b 22129->22130 22131 5a0f7ea 22130->22131 22134 5a049e0 2 API calls 22130->22134 22135 5a049d0 2 API calls 22130->22135 22136 5a05c98 2 API calls 22130->22136 22137 5a05c89 2 API calls 22130->22137 22138 5a052a0 22130->22138 22141 5a05290 22130->22141 22131->22123 22134->22131 22135->22131 22136->22131 22137->22131 22140 25da3a8 2 API calls 22138->22140 22139 5a052ad 22139->22131 22140->22139 22142 5a052ad 22141->22142 22143 25da3a8 2 API calls 22141->22143 22142->22131 22143->22142 22144 5a02369 22145 5a0237a 22144->22145 22147 5a0ee00 2 API calls 22145->22147 22146 5a02411 22147->22146 22196 5aae5c1 22197 5aae613 22196->22197 22198 5aae662 22197->22198 22199 5aae631 MonitorFromPoint 22197->22199 22199->22198 22148 25dc690 GetCurrentProcess 22149 25dc70a GetCurrentThread 22148->22149 22150 25dc703 22148->22150 22151 25dc747 GetCurrentProcess 22149->22151 22152 25dc740 22149->22152 22150->22149 22153 25dc77d 22151->22153 22152->22151 22154 25dc7a5 GetCurrentThreadId 22153->22154 22155 25dc7d6 22154->22155 22200 25da2b0 22202 25da3a8 2 API calls 22200->22202 22201 25da2bf 22202->22201 22085 5a0298e 22089 5a05468 22085->22089 22093 5a05458 22085->22093 22086 5a029a0 22090 5a0547f 22089->22090 22097 5a03f10 22090->22097 22092 5a05499 22092->22086 22094 5a0547f 22093->22094 22095 5a03f10 2 API calls 22094->22095 22096 5a05499 22095->22096 22096->22086 22098 5a03f1b 22097->22098 22099 5a054c3 22098->22099 22100 25d70ec 2 API calls 22098->22100 22101 25d7aa1 2 API calls 22098->22101 22099->22092 22100->22099 22101->22099 22156 5a01476 22159 5a03f4c 22156->22159 22160 5a03f57 22159->22160 22163 5a03f5c 22160->22163 22162 5a01488 22164 5a03f67 22163->22164 22165 5a062f2 22164->22165 22166 25d70ec 2 API calls 22164->22166 22167 25d7aa1 2 API calls 22164->22167 22165->22162 22166->22165 22167->22165 22168 5a010fa 22170 5a04857 2 API calls 22168->22170 22171 5a04868 2 API calls 22168->22171 22169 5a0110c 22170->22169 22171->22169 21951 5a02bbd 21955 5a04857 21951->21955 21959 5a04868 21951->21959 21952 5a02bc9 21956 5a0487f 21955->21956 21963 5a03ce0 21956->21963 21960 5a0487f 21959->21960 21961 5a03ce0 2 API calls 21960->21961 21962 5a04899 21961->21962 21962->21952 21964 5a03ceb 21963->21964 21966 5a04899 21964->21966 21967 5a03cf0 21964->21967 21966->21952 21968 5a03cfb 21967->21968 21972 25d70ec 21968->21972 21983 25d7aa1 21968->21983 21969 5a04954 21969->21966 21973 25d70f7 21972->21973 21975 25d7d3e 21973->21975 21994 5a0cb70 21973->21994 21997 5a049e0 21973->21997 22000 5a05c98 21973->22000 22003 5a05c89 21973->22003 22006 5a049d0 21973->22006 21974 25d7d7c 21974->21969 21975->21974 22009 25dc3c8 21975->22009 22014 25dc3b9 21975->22014 21984 25d7adb 21983->21984 21986 25d7d3e 21984->21986 21987 5a0cb70 2 API calls 21984->21987 21988 5a049e0 2 API calls 21984->21988 21989 5a049d0 2 API calls 21984->21989 21990 5a05c98 2 API calls 21984->21990 21991 5a05c89 2 API calls 21984->21991 21985 25d7d7c 21985->21969 21986->21985 21992 25dc3b9 2 API calls 21986->21992 21993 25dc3c8 2 API calls 21986->21993 21987->21986 21988->21986 21989->21986 21990->21986 21991->21986 21992->21985 21993->21985 22019 5a0cc78 21994->22019 21995 5a0cb7f 21995->21975 22042 5a04a48 21997->22042 21998 5a049ee 21998->21975 22001 5a05ca6 22000->22001 22002 25da3a8 2 API calls 22000->22002 22001->21975 22002->22001 22005 25da3a8 2 API calls 22003->22005 22004 5a05ca6 22004->21975 22005->22004 22007 5a049ee 22006->22007 22008 5a04a48 2 API calls 22006->22008 22007->21975 22008->22007 22011 25dc3e9 22009->22011 22010 25dc40d 22010->21974 22011->22010 22045 25dc578 22011->22045 22049 25dc567 22011->22049 22015 25dc3e9 22014->22015 22016 25dc40d 22015->22016 22017 25dc578 2 API calls 22015->22017 22018 25dc567 2 API calls 22015->22018 22016->21974 22017->22016 22018->22016 22022 25da3a8 22019->22022 22020 5a0cc8a 22020->21995 22023 25da3bb 22022->22023 22024 25da3d3 22023->22024 22030 25da621 22023->22030 22034 25da630 22023->22034 22024->22020 22025 25da3cb 22025->22024 22026 25da5d0 GetModuleHandleW 22025->22026 22027 25da5fd 22026->22027 22027->22020 22031 25da62d 22030->22031 22032 25da669 22031->22032 22038 25d9740 22031->22038 22032->22025 22035 25da644 22034->22035 22036 25d9740 LoadLibraryExW 22035->22036 22037 25da669 22035->22037 22036->22037 22037->22025 22039 25da810 LoadLibraryExW 22038->22039 22041 25da889 22039->22041 22041->22032 22044 25da3a8 2 API calls 22042->22044 22043 5a04a57 22043->21998 22044->22043 22046 25dc585 22045->22046 22047 25dc5bf 22046->22047 22053 25db0bc 22046->22053 22047->22010 22050 25dc585 22049->22050 22051 25dc5bf 22050->22051 22052 25db0bc 2 API calls 22050->22052 22051->22010 22052->22051 22054 25db0c7 22053->22054 22056 25dd2b8 22054->22056 22057 25dc8cc 22054->22057 22056->22056 22058 25dc8d7 22057->22058 22059 25d70ec 2 API calls 22058->22059 22060 25dd327 22059->22060 22063 25df0dd 22060->22063 22064 25dd360 22063->22064 22065 25df0f5 22063->22065 22064->22056 22070 25df3f8 22065->22070 22074 25df430 22065->22074 22079 25df3eb 22065->22079 22066 25df12e 22071 25df3fb 22070->22071 22072 25da3a8 LoadLibraryExW GetModuleHandleW 22071->22072 22073 25df401 22072->22073 22073->22066 22075 25df3fb 22074->22075 22078 25df43b 22074->22078 22076 25da3a8 LoadLibraryExW GetModuleHandleW 22075->22076 22077 25df401 22076->22077 22077->22066 22078->22066 22080 25df3fb 22079->22080 22081 25da3a8 LoadLibraryExW GetModuleHandleW 22080->22081 22082 25df401 22081->22082 22082->22066 22083 25dccc0 DuplicateHandle 22084 25dcd56 22083->22084 22172 25d7200 22173 25d7224 22172->22173 22176 25d706c 22173->22176 22175 25d7236 22177 25d7077 22176->22177 22180 25d708c 22177->22180 22179 25d745d 22179->22175 22181 25d7097 22180->22181 22184 25d70bc 22181->22184 22183 25d753a 22183->22179 22185 25d70c7 22184->22185 22186 25d70ec 2 API calls 22185->22186 22187 25d762a 22186->22187 22187->22183

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 201 25d4610-25d4619 202 25d461b-25d464e 201->202 203 25d45d5-25d45e1 201->203 204 25d4655-25d468e 202->204 205 25d4650 202->205 304 25d45e6 call 25d4610 203->304 305 25d45e6 call 25d4620 203->305 206 25d468f 204->206 205->204 208 25d4696-25d46b2 206->208 207 25d45ec-25d460f 209 25d46bb-25d46bc 208->209 210 25d46b4 208->210 213 25d4979-25d497a 209->213 226 25d46c1-25d46ea 209->226 210->206 212 25d48de-25d48e7 210->212 210->213 214 25d47d9-25d482a 210->214 215 25d497b 210->215 216 25d49fb-25d4a0f 210->216 217 25d4835-25d4854 210->217 218 25d4737-25d4760 210->218 219 25d4896-25d48a8 210->219 220 25d48ad-25d48c1 call 25d4044 210->220 221 25d490d-25d4911 210->221 222 25d48ec-25d48f0 210->222 223 25d492a-25d4965 210->223 224 25d496a-25d4974 210->224 225 25d49aa-25d49ba 210->225 210->226 212->208 213->215 214->217 228 25d4982-25d499e 215->228 231 25d4bc3 216->231 260 25d486d-25d4877 217->260 261 25d4856-25d486b 217->261 263 25d476a 218->263 264 25d4762-25d4768 218->264 219->208 241 25d48ca-25d48d9 220->241 235 25d48c3 221->235 236 25d4913-25d4925 221->236 233 25d4c6f-25d4c73 222->233 234 25d48f6-25d4908 222->234 223->208 224->208 229 25d49bc-25d49c9 225->229 230 25d49cb 225->230 258 25d46ec-25d46f2 226->258 259 25d46f4 226->259 239 25d49a7-25d49a8 228->239 240 25d49a0 228->240 246 25d49ce 229->246 230->246 238 25d4bc4 231->238 248 25d4c79 233->248 234->208 235->241 236->208 249 25d4bcb-25d4be7 238->249 239->216 239->225 240->215 240->216 240->225 240->238 240->248 250 25d4ae9-25d4b7d 240->250 251 25d4c6b-25d4c6c 240->251 252 25d4cc5-25d4cd1 240->252 253 25d4ab7 240->253 254 25d4cb1-25d4cc3 240->254 255 25d4bf3-25d4c1c 240->255 256 25d4b82-25d4bb8 240->256 241->208 269 25d49d5-25d49f9 246->269 262 25d4c80-25d4c9c 248->262 266 25d4be9 249->266 267 25d4bf0-25d4bf1 249->267 271 25d4abe-25d4ada 250->271 251->248 253->271 254->262 282 25d4c1e-25d4c24 255->282 283 25d4c26 255->283 256->231 270 25d46f7-25d4732 258->270 259->270 272 25d4881-25d4891 260->272 261->272 273 25d4cae-25d4caf 262->273 274 25d4c9e 262->274 268 25d476d-25d47a6 263->268 264->268 266->238 266->248 266->251 266->252 266->254 266->255 267->251 267->255 299 25d47b9-25d47c0 268->299 300 25d47a8-25d47b7 268->300 269->228 270->208 277 25d4adc 271->277 278 25d4ae3-25d4ae4 271->278 272->208 273->252 273->254 274->248 274->252 274->254 277->238 277->248 277->250 277->251 277->252 277->253 277->254 277->255 277->256 278->250 278->256 287 25d4c29-25d4c66 282->287 283->287 287->249 301 25d47c7-25d47d4 299->301 300->301 301->208 304->207 305->207
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID: [
                            • API String ID: 0-3878419350
                            • Opcode ID: 63e85f9354cd3f51f13d35665a7fc2b60a3d22242dff5e8b1ea48f9bd023a46e
                            • Instruction ID: 8b977ed2f261886be41b3154e253988213c9932fa0efd417bf99449ccda0ff92
                            • Opcode Fuzzy Hash: 63e85f9354cd3f51f13d35665a7fc2b60a3d22242dff5e8b1ea48f9bd023a46e
                            • Instruction Fuzzy Hash: 38021574E05219CFDB64CFA9D984B9DBBB2FB88310F1084AAD50AAB354DB309D81CF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 306 25d4620-25d464e 307 25d4655-25d468e 306->307 308 25d4650 306->308 309 25d468f 307->309 308->307 310 25d4696-25d46b2 309->310 311 25d46bb-25d46bc 310->311 312 25d46b4 310->312 314 25d4979-25d497a 311->314 327 25d46c1-25d46ea 311->327 312->309 313 25d48de-25d48e7 312->313 312->314 315 25d47d9-25d482a 312->315 316 25d497b 312->316 317 25d49fb-25d4a0f 312->317 318 25d4835-25d4854 312->318 319 25d4737-25d4760 312->319 320 25d4896-25d48a8 312->320 321 25d48ad-25d48c1 call 25d4044 312->321 322 25d490d-25d4911 312->322 323 25d48ec-25d48f0 312->323 324 25d492a-25d4965 312->324 325 25d496a-25d4974 312->325 326 25d49aa-25d49ba 312->326 312->327 313->310 314->316 315->318 328 25d4982-25d499e 316->328 331 25d4bc3 317->331 360 25d486d-25d4877 318->360 361 25d4856-25d486b 318->361 363 25d476a 319->363 364 25d4762-25d4768 319->364 320->310 341 25d48ca-25d48d9 321->341 335 25d48c3 322->335 336 25d4913-25d4925 322->336 333 25d4c6f-25d4c73 323->333 334 25d48f6-25d4908 323->334 324->310 325->310 329 25d49bc-25d49c9 326->329 330 25d49cb 326->330 358 25d46ec-25d46f2 327->358 359 25d46f4 327->359 339 25d49a7-25d49a8 328->339 340 25d49a0 328->340 346 25d49ce 329->346 330->346 338 25d4bc4 331->338 348 25d4c79 333->348 334->310 335->341 336->310 349 25d4bcb-25d4be7 338->349 339->317 339->326 340->316 340->317 340->326 340->338 340->348 350 25d4ae9-25d4b7d 340->350 351 25d4c6b-25d4c6c 340->351 352 25d4cc5-25d4cd1 340->352 353 25d4ab7 340->353 354 25d4cb1-25d4cc3 340->354 355 25d4bf3-25d4c1c 340->355 356 25d4b82-25d4bb8 340->356 341->310 369 25d49d5-25d49f9 346->369 362 25d4c80-25d4c9c 348->362 366 25d4be9 349->366 367 25d4bf0-25d4bf1 349->367 371 25d4abe-25d4ada 350->371 351->348 353->371 354->362 382 25d4c1e-25d4c24 355->382 383 25d4c26 355->383 356->331 370 25d46f7-25d4732 358->370 359->370 372 25d4881-25d4891 360->372 361->372 373 25d4cae-25d4caf 362->373 374 25d4c9e 362->374 368 25d476d-25d47a6 363->368 364->368 366->338 366->348 366->351 366->352 366->354 366->355 367->351 367->355 399 25d47b9-25d47c0 368->399 400 25d47a8-25d47b7 368->400 369->328 370->310 377 25d4adc 371->377 378 25d4ae3-25d4ae4 371->378 372->310 373->352 373->354 374->348 374->352 374->354 377->338 377->348 377->350 377->351 377->352 377->353 377->354 377->355 377->356 378->350 378->356 387 25d4c29-25d4c66 382->387 383->387 387->349 401 25d47c7-25d47d4 399->401 400->401 401->310
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID: [
                            • API String ID: 0-3878419350
                            • Opcode ID: 0746306294f114e818a82c9b4a0ba50c42bda2fd6fceb6fe16e4bf5c74f7c5f3
                            • Instruction ID: 0fc5e1bcc94ebfc581a4e5e84ca3a912e2ee8f796641db193a5fe3ab3305741b
                            • Opcode Fuzzy Hash: 0746306294f114e818a82c9b4a0ba50c42bda2fd6fceb6fe16e4bf5c74f7c5f3
                            • Instruction Fuzzy Hash: 97021374E04219CFDB24CFA9D984B9DBBB2FB89300F1084AAD50AAB354DB709D81CF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.282982022.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5aa0000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID: r=&%
                            • API String ID: 0-1142658731
                            • Opcode ID: 1de97ea3c4d1a3a5adfdc4a8d342781992e13429c6c81e3a86880e8cc6cf9442
                            • Instruction ID: 9dd95031502ac0f492665bdd6b29472ef8586feb1b4e9c97f05dc099078190c8
                            • Opcode Fuzzy Hash: 1de97ea3c4d1a3a5adfdc4a8d342781992e13429c6c81e3a86880e8cc6cf9442
                            • Instruction Fuzzy Hash: 80610B75E05209DFCB08DFA9D995AAEFBB2FF88300F14802AD516B7354DB745942CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2fa359d87f4da9afa49082515a7dab4dc7ec23ec6a39a02f40d44b1a8a68143a
                            • Instruction ID: 66b34b877108b308fa9b86fccc1e15ed10bf33f92497314606319ec32ab3e784
                            • Opcode Fuzzy Hash: 2fa359d87f4da9afa49082515a7dab4dc7ec23ec6a39a02f40d44b1a8a68143a
                            • Instruction Fuzzy Hash: B7C161B1D917458BD390DF25E4885893BB1BB84329FD14B08D3A1ABAD0E774107EEF88
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 025DC6F0
                            • GetCurrentThread.KERNEL32 ref: 025DC72D
                            • GetCurrentProcess.KERNEL32 ref: 025DC76A
                            • GetCurrentThreadId.KERNEL32 ref: 025DC7C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 2fc852f03456e849ff473144d56622ad0e8cdd1e4af09de9cc457e8fd0365f5c
                            • Instruction ID: ccdb57029d7a5524166851725a5e28a2ef0c281fba93ff045e1f3ee046a01317
                            • Opcode Fuzzy Hash: 2fc852f03456e849ff473144d56622ad0e8cdd1e4af09de9cc457e8fd0365f5c
                            • Instruction Fuzzy Hash: 6E5166B0D006498FEB14CFA9D588BDEBBF0FF88314F24859EE049A7650C7B49944CB65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 025DC6F0
                            • GetCurrentThread.KERNEL32 ref: 025DC72D
                            • GetCurrentProcess.KERNEL32 ref: 025DC76A
                            • GetCurrentThreadId.KERNEL32 ref: 025DC7C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 2721760e2e461a81b7a6ec6eb847dc4d647c58e44513fbbd7335255ab5cf3140
                            • Instruction ID: 204a799302bbfcf715037ef94b7b11476c5b1a0c311af1e7bae69170f3c4562c
                            • Opcode Fuzzy Hash: 2721760e2e461a81b7a6ec6eb847dc4d647c58e44513fbbd7335255ab5cf3140
                            • Instruction Fuzzy Hash: CA5133B0D002499FDB14CFA9D588BDEBBF0FF88315F24855AE049A7250D7B4A944CBA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 146 25da3a8-25da3bd call 25d817c 149 25da3bf 146->149 150 25da3d3-25da3d7 146->150 199 25da3c5 call 25da621 149->199 200 25da3c5 call 25da630 149->200 151 25da3d9-25da3e3 150->151 152 25da3eb-25da42c 150->152 151->152 157 25da42e-25da436 152->157 158 25da439-25da447 152->158 153 25da3cb-25da3cd 153->150 155 25da508-25da5c8 153->155 194 25da5ca-25da5cd 155->194 195 25da5d0-25da5fb GetModuleHandleW 155->195 157->158 160 25da449-25da44e 158->160 161 25da46b-25da46d 158->161 162 25da459 160->162 163 25da450-25da457 call 25d96e4 160->163 164 25da470-25da477 161->164 167 25da45b-25da469 162->167 163->167 168 25da479-25da481 164->168 169 25da484-25da48b 164->169 167->164 168->169 171 25da48d-25da495 169->171 172 25da498-25da4a1 call 25d96f4 169->172 171->172 176 25da4ae-25da4b3 172->176 177 25da4a3-25da4ab 172->177 179 25da4b5-25da4bc 176->179 180 25da4d1-25da4de 176->180 177->176 179->180 181 25da4be-25da4ce call 25d9704 call 25d9714 179->181 187 25da501-25da507 180->187 188 25da4e0-25da4fe 180->188 181->180 188->187 194->195 196 25da5fd-25da603 195->196 197 25da604-25da618 195->197 196->197 199->153 200->153
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 025DA5EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 7b47e1b0441fe62c8bc61ed1fb7d55891e54174e699854b1faa5518bcea5fe56
                            • Instruction ID: 8ce7520630e77ed5e6b24b0c07412b4002d3952950b87dd191983ca53eb108f8
                            • Opcode Fuzzy Hash: 7b47e1b0441fe62c8bc61ed1fb7d55891e54174e699854b1faa5518bcea5fe56
                            • Instruction Fuzzy Hash: 2C710270A00B058FDB64DF29D44479BBBF1BF88214F008A2ED48AD7A50DB74E846CF95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 404 5aae5c1-5aae61c 406 5aae61e-5aae660 MonitorFromPoint 404->406 407 5aae682-5aae69d 404->407 410 5aae669-5aae674 406->410 411 5aae662-5aae668 406->411 414 5aae69f-5aae6ac 407->414 413 5aae67d-5aae680 410->413 411->410 413->414
                            APIs
                            • MonitorFromPoint.USER32(?,?,00000002), ref: 05AAE64F
                            Memory Dump Source
                            • Source File: 00000000.00000002.282982022.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5aa0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: FromMonitorPoint
                            • String ID:
                            • API String ID: 1566494148-0
                            • Opcode ID: 40522de99c34b2e5076bdb3e8021889e4d849f40d4cc4ec1cd6652b38345f9e8
                            • Instruction ID: d58def6d9b91b3d62a9c82f2d190279fca09ed371a5472867f7dfd95494103c4
                            • Opcode Fuzzy Hash: 40522de99c34b2e5076bdb3e8021889e4d849f40d4cc4ec1cd6652b38345f9e8
                            • Instruction Fuzzy Hash: 5C214879A002549BDF109FA9D445BEEBBF5EB88310F04841AE956A7380CB349A45CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 416 25dccb8-25dcd54 DuplicateHandle 417 25dcd5d-25dcd7a 416->417 418 25dcd56-25dcd5c 416->418 418->417
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 025DCD47
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 9daf4cb103cbdd913a4fbdad6f0624c5e66399bd577cf1fd6f9f6ad8b64e8c5a
                            • Instruction ID: 5abd1b52c2736ad654faf1277763deedf2b00b3844488d4339eb750a6155e738
                            • Opcode Fuzzy Hash: 9daf4cb103cbdd913a4fbdad6f0624c5e66399bd577cf1fd6f9f6ad8b64e8c5a
                            • Instruction Fuzzy Hash: 672122B5900248DFDB10DFAAD984ADEBFF4FB88320F14851AE914A7350C334A944CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 421 25dccc0-25dcd54 DuplicateHandle 422 25dcd5d-25dcd7a 421->422 423 25dcd56-25dcd5c 421->423 423->422
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 025DCD47
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 44f9893e867b87c3b06d47822b25e5783a493aaacdf637609f198e56899a9107
                            • Instruction ID: b83712c3e89ac1f97de1496ede76e0af6a00605b77cbbd3a7ac43a35d88feb81
                            • Opcode Fuzzy Hash: 44f9893e867b87c3b06d47822b25e5783a493aaacdf637609f198e56899a9107
                            • Instruction Fuzzy Hash: 7921E2B5900248AFDB10CFAAD984ADEBFF8FB48324F14851AE915A7310C374A944CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 426 25d9740-25da850 428 25da858-25da887 LoadLibraryExW 426->428 429 25da852-25da855 426->429 430 25da889-25da88f 428->430 431 25da890-25da8ad 428->431 429->428 430->431
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,025DA669,00000800,00000000,00000000), ref: 025DA87A
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 6c20f2bbf64c05eefd1f9a69230e57b81c9c2c8fd79e112cceafb864436a413b
                            • Instruction ID: 716a9782ca3c6eb433534b96431911bd231bf67ffa82d1957bd662ea66ae3220
                            • Opcode Fuzzy Hash: 6c20f2bbf64c05eefd1f9a69230e57b81c9c2c8fd79e112cceafb864436a413b
                            • Instruction Fuzzy Hash: 7411F2B69002489BDB20CF9AC444BDEBBF4EB88364F04852AE819A7200C375A945CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 434 25da808-25da850 435 25da858-25da887 LoadLibraryExW 434->435 436 25da852-25da855 434->436 437 25da889-25da88f 435->437 438 25da890-25da8ad 435->438 436->435 437->438
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,025DA669,00000800,00000000,00000000), ref: 025DA87A
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 0bd0697ff657daeb4a8e779fa24544609c52e3c75b8e74806ddf96d159068a38
                            • Instruction ID: bfc8cb2f7fe097c4cf532c3a5345fa102dbeb3422fdf01e45a2f0c30fc4cf118
                            • Opcode Fuzzy Hash: 0bd0697ff657daeb4a8e779fa24544609c52e3c75b8e74806ddf96d159068a38
                            • Instruction Fuzzy Hash: DA1136B6D002498FDB20CF99D444BDEBBF4AB88324F14851EE859B7600C374A546CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 025DA5EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: e7544f1e4b028fb2061042dfe229078ddc4ad926074935e2f4c5f4f0aef9a6d2
                            • Instruction ID: 69e747b35711b395eb2add7142af9e15623fa4ebf195e6ecadc1f8a5cd8df200
                            • Opcode Fuzzy Hash: e7544f1e4b028fb2061042dfe229078ddc4ad926074935e2f4c5f4f0aef9a6d2
                            • Instruction Fuzzy Hash: 7711DFB5D006498FDB20DF9AD444BDFFBF4EB88224F14851AD819A7600D378A945CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264958305.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c8d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0be05ba6db02c5ab8aa30ee2c330e0e3e5d30ce939cc1a0939194e199cfd2331
                            • Instruction ID: 660c85191b6a98b375a218152f9d10d3cc12533371ded305733e4dd38bee213d
                            • Opcode Fuzzy Hash: 0be05ba6db02c5ab8aa30ee2c330e0e3e5d30ce939cc1a0939194e199cfd2331
                            • Instruction Fuzzy Hash: 15219F75508380DFCB069F60D984B15BFB1EF46324F19C5EAD8458F2A7C37A9846CB61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264901302.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c7d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f381dd280240755f253149b3b2fe7c14c2ee2fd28f471ae4e34d21452ef646b4
                            • Instruction ID: 7bd854b1b37a9f198f56487ca4db05d2e316184f024ab438d3984d93a7879b9f
                            • Opcode Fuzzy Hash: f381dd280240755f253149b3b2fe7c14c2ee2fd28f471ae4e34d21452ef646b4
                            • Instruction Fuzzy Hash: 5A2103B1504240EFCB04DF10D9C0F26BB75FF88324F24C5A9E90A5B246C336E856CBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264958305.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c8d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 094b6da4b9739eca595595e817402a193c6565c3f02b707f085edf3d9a3c8653
                            • Instruction ID: d3ecaf7f3a85f4ef53a96ceb521569b2f407737949fcdb796d718d45910c4c36
                            • Opcode Fuzzy Hash: 094b6da4b9739eca595595e817402a193c6565c3f02b707f085edf3d9a3c8653
                            • Instruction Fuzzy Hash: 61210775604244DFCB04EF10D5C4B26BB75FB88328F24C97DE94A4B296C336D846CB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264958305.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c8d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3411f4104dd242e37f7280c9143928fe1868e1b0d1fedf9acfd6fdfa3e9b1ee
                            • Instruction ID: 3eb24cfd700f33c9c3a289c648a7fc1876995c495c5bd342ad84d158f4d4648c
                            • Opcode Fuzzy Hash: c3411f4104dd242e37f7280c9143928fe1868e1b0d1fedf9acfd6fdfa3e9b1ee
                            • Instruction Fuzzy Hash: 432107B1504200DFDB04EF10D9C4B2ABB65FB84328F24C56DD90A4B286C73AD846CB65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264901302.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c7d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9acf0571e1eb09d12e87848d203640fb70799814417222053bb6dfdaa15c7d3d
                            • Instruction ID: 9540b3494c5ec58ca7720ec519b1700ca3c82468308f44183c4f98bac61d3762
                            • Opcode Fuzzy Hash: 9acf0571e1eb09d12e87848d203640fb70799814417222053bb6dfdaa15c7d3d
                            • Instruction Fuzzy Hash: 07119376504280DFCB15CF10D9C4B16BF71FF94324F28C6A9D84A4B656C336E956CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264958305.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c8d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59f8916af98508d2bb1f9a7757f22dd00ce9b8b7a4e5ff565e9d222f537b1ecc
                            • Instruction ID: 4146836537b991192397b3d9b568e8115ae12026cb7bd6f34544416a6fb8d66d
                            • Opcode Fuzzy Hash: 59f8916af98508d2bb1f9a7757f22dd00ce9b8b7a4e5ff565e9d222f537b1ecc
                            • Instruction Fuzzy Hash: 8D119D79504280DFCB11DF14D5C4B15BBB1FB84328F28C6ADD84A4B6A6C33AD94ACB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264901302.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c7d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 63f7bb58eeda4326afd8ccf08ff1842fcbb7f3f4a3f1ffc7bbfcfe2cbe082bc2
                            • Instruction ID: 6a2f9a4e0921deaa943b2a374ca2dfae954e70e8ef7781fdfced450681b04c54
                            • Opcode Fuzzy Hash: 63f7bb58eeda4326afd8ccf08ff1842fcbb7f3f4a3f1ffc7bbfcfe2cbe082bc2
                            • Instruction Fuzzy Hash: A001A7715083449BD7148E16DCC4B67FBE8EF51374F18C159ED1E5A24AC3789D44CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.264901302.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_c7d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 35d6a34115ce2ad268136486d32ddee1fefb9a191a70e68ceb8eecae834edf9b
                            • Instruction ID: 22ad13284b01cac9251e690b7e0caa88b87adacacb0aa3470ae4ed1d560cfded
                            • Opcode Fuzzy Hash: 35d6a34115ce2ad268136486d32ddee1fefb9a191a70e68ceb8eecae834edf9b
                            • Instruction Fuzzy Hash: B2F0AF71404284AAE7148E05DCC4B62FFE8EF51774F18C15AED195B28AC3789C44CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: df5035979d3e778fb3007c874ec97683fa561e31580d232f9fa2f8628c930a63
                            • Instruction ID: 3c3de75c6dea594f45b53f06d4091d011fcfced388b4411cff86fbbde5720ba9
                            • Opcode Fuzzy Hash: df5035979d3e778fb3007c874ec97683fa561e31580d232f9fa2f8628c930a63
                            • Instruction Fuzzy Hash: FD12EAF1C91B468BD390CF65E5885893BA1B74432AFD14A08D3A19BAD0E7B4017EEF4C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7383ade5e4dc2abb1c7e9de20426535063b220193c79620458d5674e3ac56191
                            • Instruction ID: d0696640305b53cde5ba7dbd4d17f78c8777d83e42da7b1d89bdd73616d89b31
                            • Opcode Fuzzy Hash: 7383ade5e4dc2abb1c7e9de20426535063b220193c79620458d5674e3ac56191
                            • Instruction Fuzzy Hash: 72A16D36E0061ACFCF25DFA9C8445DDBBB2FF88304B15856AE915AF220EB31A955CF44
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.265738320.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_25d0000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7eff56b1221ad965733c3d62c50518f1c05516934e91b3f7d6b2b1594428ef1d
                            • Instruction ID: 296cfe257506f69aca26f5c3b56c8c57912be538398ee0b7be647457e4f006b0
                            • Opcode Fuzzy Hash: 7eff56b1221ad965733c3d62c50518f1c05516934e91b3f7d6b2b1594428ef1d
                            • Instruction Fuzzy Hash: 6E513C74E05209DFCB14CFA9D584AAEBBF1FF88310F1498AAD505A7360E7349A44CF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Execution Graph

                            Execution Coverage:16.3%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:2.5%
                            Total number of Nodes:244
                            Total number of Limit Nodes:15
                            execution_graph 25887 7554751 25888 755472f 25887->25888 25889 755478f 25888->25889 25892 7554a80 25888->25892 25896 7554a9b 25888->25896 25893 7554a9a 25892->25893 25901 7554ab0 25892->25901 25906 7554aa0 25892->25906 25893->25888 25897 7554a92 25896->25897 25899 7554ab0 GetCurrentThreadId 25897->25899 25900 7554aa0 GetCurrentThreadId 25897->25900 25898 7554a9a 25898->25888 25899->25898 25900->25898 25902 7554ab8 25901->25902 25903 7554adf 25902->25903 25911 66811a8 25902->25911 25915 66810c0 25902->25915 25903->25893 25907 7554aa3 25906->25907 25908 7554adf 25907->25908 25909 66811a8 GetCurrentThreadId 25907->25909 25910 66810c0 GetCurrentThreadId 25907->25910 25908->25893 25909->25908 25910->25908 25913 66811b8 25911->25913 25912 6681225 25912->25903 25913->25912 25919 6681478 25913->25919 25916 66810e0 25915->25916 25917 6681109 25915->25917 25916->25917 25918 6681478 GetCurrentThreadId 25916->25918 25917->25903 25918->25917 25920 66814cf 25919->25920 25922 6681488 25919->25922 25924 6681550 25920->25924 25921 66814dc 25921->25912 25922->25912 25925 66815a3 25924->25925 25926 668160f GetCurrentThreadId 25925->25926 25927 66815df 25925->25927 25926->25927 25928 2befbf8 25929 2befc60 CreateWindowExW 25928->25929 25931 2befd1c 25929->25931 26061 2be6758 26064 2be6344 26061->26064 26063 2be6766 26065 2be634f 26064->26065 26068 2be6394 26065->26068 26067 2be688d 26067->26063 26069 2be639f 26068->26069 26072 2be63c4 26069->26072 26071 2be6962 26071->26067 26073 2be63cf 26072->26073 26076 2be63f4 26073->26076 26075 2be6a62 26075->26071 26077 2be63ff 26076->26077 26078 2be717e 26077->26078 26082 2be92b9 26077->26082 26079 2be71bc 26078->26079 26086 2beb3f9 26078->26086 26079->26075 26091 2be92f0 26082->26091 26095 2be92e1 26082->26095 26083 2be92ce 26083->26078 26087 2beb429 26086->26087 26088 2beb44d 26087->26088 26128 2beb5ab 26087->26128 26132 2beb5b8 26087->26132 26088->26079 26100 2be93e8 26091->26100 26108 2be93d9 26091->26108 26092 2be92ff 26092->26083 26096 2be92f0 26095->26096 26098 2be93e8 2 API calls 26096->26098 26099 2be93d9 2 API calls 26096->26099 26097 2be92ff 26097->26083 26098->26097 26099->26097 26101 2be93fb 26100->26101 26102 2be9413 26101->26102 26116 2be9670 26101->26116 26120 2be9660 26101->26120 26102->26092 26103 2be940b 26103->26102 26104 2be9610 GetModuleHandleW 26103->26104 26105 2be963d 26104->26105 26105->26092 26109 2be93fb 26108->26109 26110 2be9413 26109->26110 26114 2be9670 LoadLibraryExW 26109->26114 26115 2be9660 LoadLibraryExW 26109->26115 26110->26092 26111 2be940b 26111->26110 26112 2be9610 GetModuleHandleW 26111->26112 26113 2be963d 26112->26113 26113->26092 26114->26111 26115->26111 26117 2be9684 26116->26117 26118 2be96a9 26117->26118 26124 2be8768 26117->26124 26118->26103 26122 2be9670 26120->26122 26121 2be96a9 26121->26103 26122->26121 26123 2be8768 LoadLibraryExW 26122->26123 26123->26121 26125 2be9850 LoadLibraryExW 26124->26125 26127 2be98c9 26125->26127 26127->26118 26129 2beb5b2 26128->26129 26130 2beb5ff 26129->26130 26136 2bea0ec 26129->26136 26130->26088 26133 2beb5c5 26132->26133 26134 2bea0ec 6 API calls 26133->26134 26135 2beb5ff 26133->26135 26134->26135 26135->26088 26137 2bea0f7 26136->26137 26139 2bec2f8 26137->26139 26140 2beb904 26137->26140 26139->26139 26141 2beb90f 26140->26141 26142 2be63f4 6 API calls 26141->26142 26143 2bec367 26142->26143 26151 2bec3e0 26143->26151 26157 2bec3d3 26143->26157 26144 2bec375 26145 2beb914 LoadLibraryExW GetModuleHandleW GetModuleHandleW 26144->26145 26146 2bec38f 26145->26146 26148 2bee0f0 LoadLibraryExW GetModuleHandleW GetModuleHandleW 26146->26148 26147 2bec3a0 26147->26139 26148->26147 26152 2bec40e 26151->26152 26154 2bec437 26152->26154 26156 2bec4df 26152->26156 26163 2beb9a0 26152->26163 26155 2bec4da KiUserCallbackDispatcher 26154->26155 26154->26156 26155->26156 26158 2bec40e 26157->26158 26159 2beb9a0 GetFocus 26158->26159 26160 2bec437 26158->26160 26162 2bec4df 26158->26162 26159->26160 26161 2bec4da KiUserCallbackDispatcher 26160->26161 26160->26162 26161->26162 26164 2beb9ab 26163->26164 26165 2beba14 GetFocus 26164->26165 26166 2bec9f5 26165->26166 26166->26154 26175 6681b94 26176 6683890 DnsQuery_A 26175->26176 26178 66839ca 26176->26178 25932 7557358 25933 7557376 25932->25933 25936 7556f34 25933->25936 25935 75573ad 25937 7558e78 LoadLibraryA 25936->25937 25939 7558f54 25937->25939 25940 7550958 25941 7550965 25940->25941 25944 755096c 25940->25944 25941->25944 25945 75509f0 25941->25945 25950 75509e3 25941->25950 25946 7550a29 25945->25946 25947 7550a44 25946->25947 25955 7550b10 25946->25955 25960 7550b00 25946->25960 25947->25944 25951 75509f0 25950->25951 25952 7550a44 25951->25952 25953 7550b10 8 API calls 25951->25953 25954 7550b00 8 API calls 25951->25954 25952->25944 25953->25952 25954->25952 25956 7550b15 25955->25956 25957 7550b1b 25956->25957 25965 7550b50 25956->25965 25969 7550b40 25956->25969 25957->25947 25961 7550b23 25960->25961 25962 7550b33 25961->25962 25963 7550b50 8 API calls 25961->25963 25964 7550b40 8 API calls 25961->25964 25962->25947 25963->25962 25964->25962 25967 7550b5a 25965->25967 25966 7550b93 25966->25957 25967->25966 25973 7550be0 25967->25973 25971 7550b5a 25969->25971 25970 7550b93 25970->25957 25971->25970 25972 7550be0 8 API calls 25971->25972 25972->25970 25974 7550be6 25973->25974 25975 7550c15 25974->25975 25978 7552c70 25974->25978 25984 7552c80 25974->25984 25975->25966 25979 7552c66 25978->25979 25980 7552c7a 25978->25980 25979->25975 25989 7552d89 25980->25989 26011 7552d98 25980->26011 25981 7552ced 25981->25975 25985 7552c95 25984->25985 25987 7552d89 8 API calls 25985->25987 25988 7552d98 8 API calls 25985->25988 25986 7552ced 25986->25975 25987->25986 25988->25986 25990 7552dac 25989->25990 25999 7552d89 7 API calls 25989->25999 26001 7552d98 7 API calls 25989->26001 26033 7552ea5 25989->26033 26038 7552590 25989->26038 26044 7552e88 25989->26044 26048 7552580 25989->26048 26054 7552e6b 25989->26054 25991 7552de3 25990->25991 26003 7552ea5 GetSystemTimes 25990->26003 26004 7552590 GetSystemTimes 25990->26004 26005 7552580 GetSystemTimes 25990->26005 26006 7552d89 7 API calls 25990->26006 26007 7552e88 GetSystemTimes 25990->26007 26008 7552d98 7 API calls 25990->26008 26010 7552e6b GetSystemTimes 25990->26010 26058 7553168 25990->26058 25991->25981 25992 7552e44 25992->25981 25993 7552e40 25993->25992 25994 75531b6 GetSystemTimes 25993->25994 25995 75531f3 25994->25995 25995->25981 25999->25990 26001->25990 26003->25993 26004->25993 26005->25993 26006->25993 26007->25993 26008->25993 26010->25993 26018 7552ea5 GetSystemTimes 26011->26018 26019 7552590 GetSystemTimes 26011->26019 26020 7552580 GetSystemTimes 26011->26020 26021 7552d89 7 API calls 26011->26021 26022 7552e88 GetSystemTimes 26011->26022 26023 7552d98 7 API calls 26011->26023 26024 7552e6b GetSystemTimes 26011->26024 26012 7552de3 26012->25981 26013 7552dac 26013->26012 26025 7552ea5 GetSystemTimes 26013->26025 26026 7552590 GetSystemTimes 26013->26026 26027 7552580 GetSystemTimes 26013->26027 26028 7552d89 7 API calls 26013->26028 26029 7552e88 GetSystemTimes 26013->26029 26030 7552d98 7 API calls 26013->26030 26031 7553168 GetSystemTimes 26013->26031 26032 7552e6b GetSystemTimes 26013->26032 26014 7552e44 26014->25981 26015 7552e40 26015->26014 26016 75531b6 GetSystemTimes 26015->26016 26017 75531f3 26016->26017 26017->25981 26018->26013 26019->26013 26020->26013 26021->26013 26022->26013 26023->26013 26024->26013 26025->26015 26026->26015 26027->26015 26028->26015 26029->26015 26030->26015 26031->26015 26032->26015 26034 7552eb7 26033->26034 26035 75531b6 GetSystemTimes 26034->26035 26037 7552ec9 26034->26037 26036 75531f3 26035->26036 26036->25990 26037->25990 26039 755260d 26038->26039 26040 75525a2 26038->26040 26041 75531b6 GetSystemTimes 26039->26041 26043 7552687 26039->26043 26040->25990 26042 75531f3 26041->26042 26042->25990 26043->25990 26045 7552e9a GetSystemTimes 26044->26045 26047 75531f3 26045->26047 26047->25990 26049 7552571 26048->26049 26050 755258a 26048->26050 26049->25990 26051 75531b6 GetSystemTimes 26050->26051 26053 75525a2 26050->26053 26052 75531f3 26051->26052 26052->25990 26053->25990 26055 7552e7d GetSystemTimes 26054->26055 26057 75531f3 26055->26057 26057->25990 26059 75531b6 GetSystemTimes 26058->26059 26060 75531f3 26059->26060 26060->25993 26167 2beb6d0 GetCurrentProcess 26168 2beb74a GetCurrentThread 26167->26168 26169 2beb743 26167->26169 26170 2beb787 GetCurrentProcess 26168->26170 26171 2beb780 26168->26171 26169->26168 26174 2beb7bd 26170->26174 26171->26170 26172 2beb7e5 GetCurrentThreadId 26173 2beb816 26172->26173 26174->26172 26179 2befe40 SetWindowLongW 26180 2befeac 26179->26180 26181 2bebd00 DuplicateHandle 26182 2bebd96 26181->26182

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 64 7552590-75525a0 65 75525a2-75525b9 64->65 66 755260d 64->66 74 75525bb-75525d5 65->74 67 7552612-7552628 66->67 76 755262a-7552695 call 7551920 67->76 82 75525d3-75525dd 74->82 83 75525df-75525e2 74->83 92 7552657-7552697 76->92 93 7552699-75526bf 76->93 82->74 82->83 86 75525e4-75525ff 83->86 87 7552602-755260c 83->87 86->87 92->93 100 7552666-7552676 92->100 98 75526c5-755271e 93->98 99 755278a-7552ec3 93->99 98->99 114 75526ec-75526f4 98->114 111 7553152-75531f1 GetSystemTimes 99->111 112 7552ec9-7553007 99->112 100->93 102 7552678-7552685 100->102 102->93 105 7552687-7552692 102->105 126 75531f3-75531f9 111->126 127 75531fa-755321b 111->127 131 7553029-7553042 112->131 132 7553009-7553027 112->132 114->99 115 75526fa-7552712 114->115 118 755277c-755277e 115->118 120 7552720-7552726 118->120 121 7552780-7552789 118->121 124 7552742-7552754 120->124 125 7552728-755273c 120->125 124->99 128 7552756-755276f 124->128 125->124 126->127 128->99 130 7552771-755277b 128->130 130->118 133 7553047-755311e 131->133 132->133
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID: E
                            • API String ID: 0-3568589458
                            • Opcode ID: 9c52ed8b08c4a4809dfb3fe014d92948994076f46ed2f5b22434d245c8893997
                            • Instruction ID: 57a5a3d11c554bec3b1a8b87436cee023bd3ef0bc9d8af6c76509757b6f928fa
                            • Opcode Fuzzy Hash: 9c52ed8b08c4a4809dfb3fe014d92948994076f46ed2f5b22434d245c8893997
                            • Instruction Fuzzy Hash: 9A0228B1D1425ACFCB10CF69C8906E9FBB1BF49304F15C6ABD859AB201D770AA85CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 02BEB730
                            • GetCurrentThread.KERNEL32 ref: 02BEB76D
                            • GetCurrentProcess.KERNEL32 ref: 02BEB7AA
                            • GetCurrentThreadId.KERNEL32 ref: 02BEB803
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: fcd3fcd182e6cc4129895947d4bd93aafe440a52a8cb95c2a8e401de6575a409
                            • Instruction ID: b7b9e8c21b7d8eddf7f5299f2e5fbd35810568debbfa4bf18632d10a61a492c7
                            • Opcode Fuzzy Hash: fcd3fcd182e6cc4129895947d4bd93aafe440a52a8cb95c2a8e401de6575a409
                            • Instruction Fuzzy Hash: 505154B49047488FDB14CFAAD689B9EBBF0FF88318F248599E01AA3790C7755944CF61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 02BEB730
                            • GetCurrentThread.KERNEL32 ref: 02BEB76D
                            • GetCurrentProcess.KERNEL32 ref: 02BEB7AA
                            • GetCurrentThreadId.KERNEL32 ref: 02BEB803
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 0dc572bf188940b2fb4e3927e1af9a2a9175da752e805f7a9d96e0e129e5536c
                            • Instruction ID: 1091f2f5d0ee10b67fae91fe243cdd0dc22a8e6917c4709328585e21c71174d8
                            • Opcode Fuzzy Hash: 0dc572bf188940b2fb4e3927e1af9a2a9175da752e805f7a9d96e0e129e5536c
                            • Instruction Fuzzy Hash: 1B5144B09006488FDB14CFA9C689B9EBBF1FF88308F248599E11AA3390C7745844CF65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 267 7552ea5-7552eb1 268 7552eb7-7552ec3 267->268 269 7553152-75531f1 GetSystemTimes 267->269 268->269 270 7552ec9-7553007 268->270 276 75531f3-75531f9 269->276 277 75531fa-755321b 269->277 279 7553029-7553042 270->279 280 7553009-7553027 270->280 276->277 282 7553047-755311e 279->282 280->282
                            APIs
                            • GetSystemTimes.KERNEL32(?,?,?), ref: 075531E4
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID: SystemTimes
                            • String ID:
                            • API String ID: 375623090-0
                            • Opcode ID: 7b5288e96c82de3a5f7beb7b29e70f7d6671365f33dd402f8e187df855e4ab8d
                            • Instruction ID: 07ca51cdb919685d9a1599fcacc88a1f46c2010afbaa0d13b3dd15a7aa66764f
                            • Opcode Fuzzy Hash: 7b5288e96c82de3a5f7beb7b29e70f7d6671365f33dd402f8e187df855e4ab8d
                            • Instruction Fuzzy Hash: 29B19EB5D0021ACFDB11CF69C880AD9FBB1FF48310F15C69AD958AB205E770AA85CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 285 2be93e8-2be93fd call 2be8704 288 2be93ff 285->288 289 2be9413-2be9417 285->289 339 2be9405 call 2be9670 288->339 340 2be9405 call 2be9660 288->340 290 2be942b-2be946c 289->290 291 2be9419-2be9423 289->291 296 2be946e-2be9476 290->296 297 2be9479-2be9487 290->297 291->290 292 2be940b-2be940d 292->289 294 2be9548-2be9608 292->294 334 2be960a-2be960d 294->334 335 2be9610-2be963b GetModuleHandleW 294->335 296->297 299 2be94ab-2be94ad 297->299 300 2be9489-2be948e 297->300 303 2be94b0-2be94b7 299->303 301 2be9499 300->301 302 2be9490-2be9497 call 2be8710 300->302 306 2be949b-2be94a9 301->306 302->306 307 2be94b9-2be94c1 303->307 308 2be94c4-2be94cb 303->308 306->303 307->308 310 2be94cd-2be94d5 308->310 311 2be94d8-2be94e1 call 2be8720 308->311 310->311 315 2be94ee-2be94f3 311->315 316 2be94e3-2be94eb 311->316 318 2be94f5-2be94fc 315->318 319 2be9511-2be9515 315->319 316->315 318->319 320 2be94fe-2be950e call 2be8730 call 2be8740 318->320 341 2be9518 call 2be9968 319->341 342 2be9518 call 2be9958 319->342 320->319 323 2be951b-2be951e 326 2be9520-2be953e 323->326 327 2be9541-2be9547 323->327 326->327 334->335 336 2be963d-2be9643 335->336 337 2be9644-2be9658 335->337 336->337 339->292 340->292 341->323 342->323
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 02BE962E
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 347ff6a3fcf3c9ffb03c75ab6b26192e74d3a790cb2b20cfcd89d00d766258b9
                            • Instruction ID: 95800f6b8fc384c365ed154e1c511c072fa791ef0d7fe381ab0bff59bd192abb
                            • Opcode Fuzzy Hash: 347ff6a3fcf3c9ffb03c75ab6b26192e74d3a790cb2b20cfcd89d00d766258b9
                            • Instruction Fuzzy Hash: 4D7115B0A00B058FDB64DF2AC48575ABBF1FF88214F048A6DD48AD7A50DB75E849CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 343 7552d98-7552da4 368 7552da6 call 7552ea5 343->368 369 7552da6 call 7552590 343->369 370 7552da6 call 7552580 343->370 371 7552da6 call 7552d89 343->371 372 7552da6 call 7552e88 343->372 373 7552da6 call 7552d98 343->373 374 7552da6 call 7552e6b 343->374 344 7552dac-7552de1 348 7552de3-7552df8 344->348 349 7552dfa-7552e00 344->349 354 7552def-7552df5 348->354 353 7552e02-7552e38 349->353 349->354 375 7552e3b call 7552ea5 353->375 376 7552e3b call 7552590 353->376 377 7552e3b call 7552580 353->377 378 7552e3b call 7552d89 353->378 379 7552e3b call 7552e88 353->379 380 7552e3b call 7552d98 353->380 381 7552e3b call 7553168 353->381 382 7552e3b call 7552e6b 353->382 356 7552e40-7552e42 357 7552e44-7552e4d 356->357 358 7552e4e-7552e5a 356->358 359 7552e60-7553128 358->359 360 7553152-75531f1 GetSystemTimes 358->360 359->360 365 75531f3-75531f9 360->365 366 75531fa-755321b 360->366 365->366 368->344 369->344 370->344 371->344 372->344 373->344 374->344 375->356 376->356 377->356 378->356 379->356 380->356 381->356 382->356
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b7612453bd4a30bab88e004afef54e063e47bf06d78547ccf12a8174eea0077e
                            • Instruction ID: 94fde94cc481fbb8f3e1df30e0c115c0312d7427fb98fe1f5ed42124186bf26c
                            • Opcode Fuzzy Hash: b7612453bd4a30bab88e004afef54e063e47bf06d78547ccf12a8174eea0077e
                            • Instruction Fuzzy Hash: 7651DCB1D052499FCB00DFA8D894AEEBFB4FF49310F1485ABE909E7241D7305918CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 383 6681b94-6683903 386 668393c-66839c8 DnsQuery_A 383->386 387 6683905-668390f 383->387 396 66839ca-66839d0 386->396 397 66839d1-6683a1e 386->397 387->386 388 6683911-6683913 387->388 390 6683915-668391f 388->390 391 6683936-6683939 388->391 392 6683921 390->392 393 6683923-6683932 390->393 391->386 392->393 393->393 395 6683934 393->395 395->391 396->397 402 6683a2e-6683a32 397->402 403 6683a20-6683a24 397->403 404 6683a41-6683a45 402->404 405 6683a34-6683a37 402->405 403->402 406 6683a26 403->406 407 6683a56 404->407 408 6683a47-6683a53 404->408 405->404 406->402 408->407
                            APIs
                            • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 066839B8
                            Memory Dump Source
                            • Source File: 00000001.00000002.537776437.0000000006680000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: true
                            • Associated: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6670000_Shaheed CV.jbxd
                            Yara matches
                            Similarity
                            • API ID: Query_
                            • String ID:
                            • API String ID: 428220571-0
                            • Opcode ID: bffb8f45bd3dd193e53d549c04937fdd56f4e2a963f78b1b461e97048d9f1bd6
                            • Instruction ID: 54eb4c042561eadadf0a57a60010e52590105d16e38ccc832f4373fa3f3fa005
                            • Opcode Fuzzy Hash: bffb8f45bd3dd193e53d549c04937fdd56f4e2a963f78b1b461e97048d9f1bd6
                            • Instruction Fuzzy Hash: FC5100B1D006589FDF60DFA9C880ADEBBB5BF48704F148129E819BB350DB74A846CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 410 2befbf8-2befc5e 411 2befc69-2befc70 410->411 412 2befc60-2befc66 410->412 413 2befc7b-2befd1a CreateWindowExW 411->413 414 2befc72-2befc78 411->414 412->411 416 2befd1c-2befd22 413->416 417 2befd23-2befd5b 413->417 414->413 416->417 421 2befd5d-2befd60 417->421 422 2befd68 417->422 421->422
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02BEFD0A
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: f8a31ae8a3f1a73625e021001ce20e567d5119d7153f0401b8ccdeaac257cd13
                            • Instruction ID: 3a65481e595de3b2c59391cea007fba679c061a2969d14f1cda0f68d71b8a578
                            • Opcode Fuzzy Hash: f8a31ae8a3f1a73625e021001ce20e567d5119d7153f0401b8ccdeaac257cd13
                            • Instruction Fuzzy Hash: 0E419EB1D002199FDF14CF99C884ADEBBB5FF88314F24826AE81AAB250D7759945CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 423 6681550-66815bc 427 66815c9-66815dd 423->427 428 66815be-66815c7 423->428 434 66815f9-6681603 427->434 435 66815df-66815f7 427->435 431 6681605-6681607 428->431 433 668160f-668163d GetCurrentThreadId 431->433 436 668163f-6681645 433->436 437 6681646-668166b 433->437 434->431 438 668166d-6681671 435->438 436->437 437->438 439 668167c 438->439 440 6681673 438->440 440->439
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 06681629
                            Memory Dump Source
                            • Source File: 00000001.00000002.537776437.0000000006680000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: true
                            • Associated: 00000001.00000002.537661644.0000000006670000.00000004.08000000.00040000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6670000_Shaheed CV.jbxd
                            Yara matches
                            Similarity
                            • API ID: CurrentThread
                            • String ID:
                            • API String ID: 2882836952-0
                            • Opcode ID: 53773c65dd79698faf080f87318ff30e342263a060dbc7223cad636472797c49
                            • Instruction ID: 8bffc099bbb94ea5b007f3d2a41981af1e3aaa91080bb887a3b14c3d635adde6
                            • Opcode Fuzzy Hash: 53773c65dd79698faf080f87318ff30e342263a060dbc7223cad636472797c49
                            • Instruction Fuzzy Hash: 90316B70E00219DFDB64EF69D488BAEFBF5AF49710F188169E406A7350CB749846CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 443 7556f34-7558ecf 445 7558ed1-7558edb 443->445 446 7558f08-7558f52 LoadLibraryA 443->446 445->446 447 7558edd-7558edf 445->447 453 7558f54-7558f5a 446->453 454 7558f5b-7558f8c 446->454 448 7558ee1-7558eeb 447->448 449 7558f02-7558f05 447->449 451 7558eed 448->451 452 7558eef-7558efe 448->452 449->446 451->452 452->452 455 7558f00 452->455 453->454 458 7558f9c 454->458 459 7558f8e-7558f92 454->459 455->449 461 7558f9d 458->461 459->458 460 7558f94 459->460 460->458 461->461
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 211fc643e825878dace6085ce84abe353f0f2b97f6e957f4cc5268475b6abdb1
                            • Instruction ID: 183a6646fd5bcd935abc325648c16ea2639d4b0661e82b84b84bf1976c6a8f1b
                            • Opcode Fuzzy Hash: 211fc643e825878dace6085ce84abe353f0f2b97f6e957f4cc5268475b6abdb1
                            • Instruction Fuzzy Hash: 353134B0D10259DFDB14CFA8C895BDEBBB1BF18314F14852AE816A7380D774A446CF95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 2e43e9c3238ab3089877ce3f7b298f2faf7f01232d162f9cd201b6e81c2fbcc8
                            • Instruction ID: c7207f3b25f9ef96311abbf9dab48204fd50bb3cfa25d96411470f93eeb96f78
                            • Opcode Fuzzy Hash: 2e43e9c3238ab3089877ce3f7b298f2faf7f01232d162f9cd201b6e81c2fbcc8
                            • Instruction Fuzzy Hash: CB3102B0D10259DFDB14CFA8D895BDEBBB2BF18314F14852AE816A7380D778A446CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetSystemTimes.KERNEL32(?,?,?), ref: 075531E4
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID: SystemTimes
                            • String ID:
                            • API String ID: 375623090-0
                            • Opcode ID: a9177b9bbdc84a3b587aa2015adbe0662318657eb82df6961bd447c7be0797c1
                            • Instruction ID: e3299e2b76fefb0397a9a1f770a96d5d9d90460ac1171cf9b8f5efb3769c71c0
                            • Opcode Fuzzy Hash: a9177b9bbdc84a3b587aa2015adbe0662318657eb82df6961bd447c7be0797c1
                            • Instruction Fuzzy Hash: B53110B1D052499FCB00CFA9D880ADEBFF4FF49210F24806AE818EB251D3349945CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetSystemTimes.KERNEL32(?,?,?), ref: 075531E4
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID: SystemTimes
                            • String ID:
                            • API String ID: 375623090-0
                            • Opcode ID: f058ee9240b5f2c3166a3b8b62d78c34f9e6315c8d68ac58c335000ee184c6dc
                            • Instruction ID: d11b82e87521a2b1efec1542c85ea9a404435dc58fe2d7c5f5ee8f29880a7edb
                            • Opcode Fuzzy Hash: f058ee9240b5f2c3166a3b8b62d78c34f9e6315c8d68ac58c335000ee184c6dc
                            • Instruction Fuzzy Hash: 4D310FB1D052498FCB10CFA9C984ADEBFF4BF49310F28816AE808EB251D3349945CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BEBD87
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: eac36e3703f11a69b59f20a7f839e1cc092ad15c77dcc15e85d86de4be6ea8e9
                            • Instruction ID: bd3d72c2773eaf0c763d161dbb82b7078b807d7234926d0f04afa56a2f279581
                            • Opcode Fuzzy Hash: eac36e3703f11a69b59f20a7f839e1cc092ad15c77dcc15e85d86de4be6ea8e9
                            • Instruction Fuzzy Hash: 3721C0B5900248AFDB10CFA9D984ADEBBF4EB48224F14845AE955A7210C378A954CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BEBD87
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 5eba699cc9e5c6a8634070eeb210e494a54e31aa4f6cf63bc8896c708d850080
                            • Instruction ID: 7e5944cb018f93a471775f05667e1d2f8d9eb08aad0ee95a3a1bcd799ae1ab8b
                            • Opcode Fuzzy Hash: 5eba699cc9e5c6a8634070eeb210e494a54e31aa4f6cf63bc8896c708d850080
                            • Instruction Fuzzy Hash: 2221B3B59002489FDB10CF99D584ADEBBF4FB48324F14845AE915A7350D374A954CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetSystemTimes.KERNEL32(?,?,?), ref: 075531E4
                            Memory Dump Source
                            • Source File: 00000001.00000002.542168611.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7550000_Shaheed CV.jbxd
                            Similarity
                            • API ID: SystemTimes
                            • String ID:
                            • API String ID: 375623090-0
                            • Opcode ID: 1e4abdc6fc6f8ed59a59b1a916013e120026ec5fa3d9acfff1e98bd6a18b63b4
                            • Instruction ID: 3f2c97705ee4dc01d99bd8239e39bc7907149e56520a64c3bd833a2ba9632c9d
                            • Opcode Fuzzy Hash: 1e4abdc6fc6f8ed59a59b1a916013e120026ec5fa3d9acfff1e98bd6a18b63b4
                            • Instruction Fuzzy Hash: 0C21D3B1D012199FDB50CFA9D584BDEFBF4FF48224F14806AE908A7241D7749A44CBA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02BE96A9,00000800,00000000,00000000), ref: 02BE98BA
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 5097054f3f7d10795d360e40a568a67ff122077474129cab03a36832de60388c
                            • Instruction ID: cf8bde4f4ac2b7c209f0b143dfc2edd670ef70f55b36f3fb229c0d305e85136d
                            • Opcode Fuzzy Hash: 5097054f3f7d10795d360e40a568a67ff122077474129cab03a36832de60388c
                            • Instruction Fuzzy Hash: 1E1124B69006088BCB10CF9AC444ADEBBF4EB48354F04846ED526A7610C374A945CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02BE96A9,00000800,00000000,00000000), ref: 02BE98BA
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 544d94b2c7df7fbefac40ac0d9cb92dccadb1cff91d787c9a4743aa5955529be
                            • Instruction ID: 6fa4b5187b5da61a1fde03fc02abec6dc36ea3e4ba3d98a9d0ff82d73cbae7c1
                            • Opcode Fuzzy Hash: 544d94b2c7df7fbefac40ac0d9cb92dccadb1cff91d787c9a4743aa5955529be
                            • Instruction Fuzzy Hash: 8D1106B69002499FDF10CF9AD444ADEBBF4EB88354F04845ED416A7610C375A945CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 02BE962E
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: fdd4ccafa15f9b210c34f07fd0c302cc0e243902bf62aa82d07d2661f8e2d6cd
                            • Instruction ID: c435dbc9ffc90a166b71e2dfdaa48a46e6bc77b6e5e8657a43d95cf46bd5659e
                            • Opcode Fuzzy Hash: fdd4ccafa15f9b210c34f07fd0c302cc0e243902bf62aa82d07d2661f8e2d6cd
                            • Instruction Fuzzy Hash: 5E11CDB69006498FDB20CF9AC444A9EBBF4EF88224F14855AD41AA7600C374A549CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetWindowLongW.USER32(?,?,?), ref: 02BEFE9D
                            Memory Dump Source
                            • Source File: 00000001.00000002.512981796.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2be0000_Shaheed CV.jbxd
                            Similarity
                            • API ID: LongWindow
                            • String ID:
                            • API String ID: 1378638983-0
                            • Opcode ID: a31247440b31ce9b50f13aea02c84b266c88ebc31035428f82ae2271e11e432c
                            • Instruction ID: afbb117eaef70605d2e1d26768c27b1ab15188e0812d37e9f630a12ce29f4340
                            • Opcode Fuzzy Hash: a31247440b31ce9b50f13aea02c84b266c88ebc31035428f82ae2271e11e432c
                            • Instruction Fuzzy Hash: 161112B59002488FDB20DF99D585BDFBBF8EB88324F14855AE81AB3700C374A944CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.511194465.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_124d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3755518f44160f0dd871db5391da929521578438d5bbf56361156354df62e5ff
                            • Instruction ID: ada6c7a53166903a88163a0ff06a52ffbae696682b09a9158650c57a41f4cb08
                            • Opcode Fuzzy Hash: 3755518f44160f0dd871db5391da929521578438d5bbf56361156354df62e5ff
                            • Instruction Fuzzy Hash: 172136B1514209DFDB19CF44E9C0B26BF61FB98328F24856CDA050B206C776D805CBE1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.511194465.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_124d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 02b685a27a260194e49bc012fbd8c1880e116d3702600441b586eade5753660a
                            • Instruction ID: 5dc7411b0aaf4e5ef066fb096e044440a413106b3c89e24ab6f3b79bfe099581
                            • Opcode Fuzzy Hash: 02b685a27a260194e49bc012fbd8c1880e116d3702600441b586eade5753660a
                            • Instruction Fuzzy Hash: 832136B1614248DFCB09CF54D8C0F66BF61FB98324F24C568E9054B207C336E856CAA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.511292434.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_125d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 47fdc9f8d8d7c111c9677a3f533c0674c99e1403397a21a3194fa793d0961c40
                            • Instruction ID: 4277fd90e025dc8e80a6441e8004cf95026bbed7cd638ce82c97a3010e291abf
                            • Opcode Fuzzy Hash: 47fdc9f8d8d7c111c9677a3f533c0674c99e1403397a21a3194fa793d0961c40
                            • Instruction Fuzzy Hash: 29214270618208DFCB50CF64D8C0B26BB61FB88364F24C96DDD0A4B246C37AD807CAA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.511292434.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_125d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59fbae5201be08371ecfa44d487b869a018a571af3376ca5822b5f5e2bc7fd86
                            • Instruction ID: 450e87faf49751bb618da5251aea4174541a1d728c283ba02b2e4ea0bbb772f5
                            • Opcode Fuzzy Hash: 59fbae5201be08371ecfa44d487b869a018a571af3376ca5822b5f5e2bc7fd86
                            • Instruction Fuzzy Hash: CC219F755093848FDB02CF24D9D0B15BF71EB46314F28C5EAD9498B697C33AD84ACB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.511194465.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_124d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9acf0571e1eb09d12e87848d203640fb70799814417222053bb6dfdaa15c7d3d
                            • Instruction ID: 181d35789a89153e592ff47522e6d30b9127a742290cc74f764274b13feebbac
                            • Opcode Fuzzy Hash: 9acf0571e1eb09d12e87848d203640fb70799814417222053bb6dfdaa15c7d3d
                            • Instruction Fuzzy Hash: C7110376504284CFCB06CF54D5C0B56BF71FB94324F28C6A9D9050B617C33AE456CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.511194465.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_124d000_Shaheed CV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9acf0571e1eb09d12e87848d203640fb70799814417222053bb6dfdaa15c7d3d
                            • Instruction ID: 534ce3f8f316b3aa8f24c62093517ce2f189b385f80f8a39600a1c95c142faa0
                            • Opcode Fuzzy Hash: 9acf0571e1eb09d12e87848d203640fb70799814417222053bb6dfdaa15c7d3d
                            • Instruction Fuzzy Hash: 7911E172804284CFCF16CF44E5C0B16BF71FB84324F2882A9D9050B21BC336D456CBA2
                            Uniqueness

                            Uniqueness Score: -1.00%