Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe

Overview

General Information

Sample Name:APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Analysis ID:714049
MD5:c5ca6bf1a4d668abae8a1bd58da7fa89
SHA1:1fb0c57d1ea566b703be21a5dd2334166f5a918e
SHA256:f360431bc55ce6bbbd77f26a9bcb86b6267c3b82220d06ee4c67b44be2273735
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Creates processes with suspicious names
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe (PID: 3256 cmdline: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 1592 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe (PID: 4128 cmdline: {path} MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
      • schtasks.exe (PID: 5176 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 2264 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe (PID: 3260 cmdline: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" 0 MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 3736 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 1680 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 920 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 1276 cmdline: {path} MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
  • dhcpmon.exe (PID: 2068 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 5716 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 2760 cmdline: {path} MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "bcd7727e-ef56-4958-8ed9-949f5c5e", "Group": "Default", "Domain1": "godisgood1.hopto.org", "Domain2": "185.225.73.164", "Port": 7712, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1f1db:$x1: NanoCore.ClientPluginHost
  • 0x1f1f5:$x2: IClientNetworkHost
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x1f1db:$x2: NanoCore.ClientPluginHost
  • 0x22518:$s4: PipeCreated
  • 0x1f1c8:$s5: IClientLoggingHost
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x1f1b2:$x2: NanoCore.ClientPlugin
  • 0x1f1db:$x3: NanoCore.ClientPluginHost
  • 0x1f1a3:$i3: IClientNetwork
  • 0x1f1c8:$i6: IClientLoggingHost
  • 0x1f1f5:$i7: IClientNetworkHost
  • 0x1f208:$i8: IClientUIHost
  • 0x1ef12:$s1: ClientPlugin
  • 0x1f1bb:$s1: ClientPlugin
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x1f1db:$a1: NanoCore.ClientPluginHost
  • 0x1f1b2:$a2: NanoCore.ClientPlugin
  • 0x24206:$b7: LogClientException
  • 0x1f1c8:$b9: IClientLoggingHost
00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
Click to see the 107 entries
SourceRuleDescriptionAuthorStrings
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x3f0b:$x1: NanoCore.ClientPluginHost
  • 0x921c:$x1: NanoCore.ClientPluginHost
  • 0x3f44:$x2: IClientNetworkHost
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x3f0b:$x2: NanoCore.ClientPluginHost
  • 0x921c:$x2: NanoCore.ClientPluginHost
  • 0x400f:$s4: PipeCreated
  • 0x92fa:$s4: PipeCreated
  • 0x3f25:$s5: IClientLoggingHost
  • 0x9236:$s5: IClientLoggingHost
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x3f87:$x2: NanoCore.ClientPlugin
  • 0x9266:$x2: NanoCore.ClientPlugin
  • 0x3f0b:$x3: NanoCore.ClientPluginHost
  • 0x921c:$x3: NanoCore.ClientPluginHost
  • 0x3f9d:$i3: IClientNetwork
  • 0x927c:$i3: IClientNetwork
  • 0x3f25:$i6: IClientLoggingHost
  • 0x9236:$i6: IClientLoggingHost
  • 0x3f44:$i7: IClientNetworkHost
  • 0x3bfb:$s1: ClientPlugin
  • 0x3f90:$s1: ClientPlugin
  • 0x8ff9:$s1: ClientPlugin
  • 0x926f:$s1: ClientPlugin
  • 0x50f4:$s3: IPAddress
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x3f0b:$a1: NanoCore.ClientPluginHost
  • 0x921c:$a1: NanoCore.ClientPluginHost
  • 0x3f87:$a2: NanoCore.ClientPlugin
  • 0x9266:$a2: NanoCore.ClientPlugin
  • 0x4b10:$b7: LogClientException
  • 0x3f25:$b9: IClientLoggingHost
  • 0x9236:$b9: IClientLoggingHost
17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
Click to see the 267 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" , ParentImage: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ParentProcessId: 3256, ParentProcessName: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp, ProcessId: 1592, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:37.139.129.71192.168.2.47712496982841753 10/01/22-12:42:35.121312
SID:2841753
Source Port:7712
Destination Port:49698
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.437.139.129.714969877122025019 10/01/22-12:42:30.424505
SID:2025019
Source Port:49698
Destination Port:7712
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.437.139.129.714969877122816766 10/01/22-12:42:35.951752
SID:2816766
Source Port:49698
Destination Port:7712
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeReversingLabs: Detection: 34%
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeVirustotal: Detection: 30%Perma Link
Source: godisgood1.hopto.orgAvira URL Cloud: Label: malware
Source: 185.225.73.164Avira URL Cloud: Label: malware
Source: godisgood1.hopto.orgVirustotal: Detection: 13%Perma Link
Source: godisgood1.hopto.orgVirustotal: Detection: 13%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 36%
Source: C:\Users\user\AppData\Roaming\JLsbuY.exeReversingLabs: Detection: 36%
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\JLsbuY.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpackAvira: Label: TR/NanoCore.fadte
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "bcd7727e-ef56-4958-8ed9-949f5c5e", "Group": "Default", "Domain1": "godisgood1.hopto.org", "Domain2": "185.225.73.164", "Port": 7712, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_0657B7A1

Networking

barindex
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49698 -> 37.139.129.71:7712
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49698 -> 37.139.129.71:7712
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 37.139.129.71:7712 -> 192.168.2.4:49698
Source: Malware configuration extractorURLs: godisgood1.hopto.org
Source: Malware configuration extractorURLs: 185.225.73.164
Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
Source: Joe Sandbox ViewIP Address: 37.139.129.71 37.139.129.71
Source: global trafficTCP traffic: 192.168.2.4:49698 -> 37.139.129.71:7712
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303119536.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000A.00000002.480986509.0000000002974000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.~SBIm
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312451749.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311387611.0000000005518000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFV
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomFH
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdd
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comepkoH
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comiona
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comituF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comS
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comibi
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comic
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303629841.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comical
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.c
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307654597.000000000551B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307572542.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn#H4
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307564401.0000000005514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/om
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnT
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnoH%
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnr-f
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnsH
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303715113.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303588332.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303452217.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303515704.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comn-u
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krXH.
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krend
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comc
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304268623.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304202190.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deJ(
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.derT
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: godisgood1.hopto.org
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.345324035.000000000092B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR

System Summary

barindex
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, MRU.csLong String: Length: 129663
Source: JLsbuY.exe.0.dr, MRU.csLong String: Length: 129663
Source: 0.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.110000.0.unpack, MRU.csLong String: Length: 129663
Source: dhcpmon.exe.3.dr, MRU.csLong String: Length: 129663
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3260, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 1680, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 2068, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_0248E7100_2_0248E710
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_0248E7200_2_0248E720
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_0248C4140_2_0248C414
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_06CEE6B00_2_06CEE6B0
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04E0E4803_2_04E0E480
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04E0E4713_2_04E0E471
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04E0BBD43_2_04E0BBD4
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F5F5F83_2_04F5F5F8
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F597883_2_04F59788
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F5A6103_2_04F5A610
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_065792383_2_06579238
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_065700403_2_06570040
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_06577F783_2_06577F78
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_06578CB03_2_06578CB0
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_065792F63_2_065792F6
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000000.299314738.0000000000234000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamenRlQOE1.exe. vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.345324035.000000000092B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.380264249.0000000006DF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.380457215.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346938414.00000000024F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenRlQOE1.exe. vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.595033114.000000000731E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.591435010.00000000060B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581179879.0000000003A41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594823559.00000000072F8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594532217.00000000072C8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.457454682.00000000043BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.441282649.00000000015EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeBinary or memory string: OriginalFilenamenRlQOE1.exe. vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeReversingLabs: Detection: 34%
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeVirustotal: Detection: 30%
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile read: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeJump to behavior
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe"
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" 0
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Users\user\AppData\Roaming\JLsbuY.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8832.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@30/15@3/1
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2220:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5000:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2188:120:WilError_01
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{bcd7727e-ef56-4958-8ed9-949f5c5ea8f6}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4616:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6052:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4748:120:WilError_01
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic file information: File size 1189376 > 1048576
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x121000
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04AD8DEC push E801005Eh; retf 0_2_04AD8E01
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04ADB200 pushfd ; retf 0_2_04ADB201
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04AD1FE7 push eax; mov dword ptr [esp], ecx0_2_04AD1FFC
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04AD1FF8 push eax; mov dword ptr [esp], ecx0_2_04AD1FFC
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F569F8 pushad ; retf 3_2_04F569F9
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F569FA push esp; retf 3_2_04F56A01
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_0657A3F0 push ds; iretd 3_2_0657A3FE
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_0657BE00 push es; retf 3_2_0657CC8C
Source: initial sampleStatic PE information: section name: .text entropy: 6.951369793482402
Source: initial sampleStatic PE information: section name: .text entropy: 6.951369793482402
Source: initial sampleStatic PE information: section name: .text entropy: 6.951369793482402
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Users\user\AppData\Roaming\JLsbuY.exeJump to dropped file
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile opened: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3260, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1680, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2068, type: MEMORYSTR
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 3996Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 6048Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 972Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5276Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1968Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 6052Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5348Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5336Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeWindow / User API: threadDelayed 9216Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeWindow / User API: foregroundWindowGot 440Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeWindow / User API: foregroundWindowGot 384Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.468982131.0000000007333000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000009.00000002.445842687.00000000012CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:m
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_065739C0 LdrInitializeThunk,3_2_065739C0
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMemory written: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMemory written: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmpJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.578822012.0000000002D20000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580163177.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.595087597.000000000768E000.00000004.00000010.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592546991.000000000653D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.595175494.000000000798E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager0
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593174195.0000000006A7E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager X
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR

Remote Access Functionality

barindex
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
21
Input Capture
21
Security Software Discovery
Remote Services21
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingData Transfer Size Limits11
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items3
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 714049 Sample: APPLICATION FORM MASTER SDP... Startdate: 01/10/2022 Architecture: WINDOWS Score: 100 67 Snort IDS alert for network traffic 2->67 69 Multi AV Scanner detection for domain / URL 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 15 other signatures 2->73 8 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 6 2->8         started        12 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 4 2->12         started        14 dhcpmon.exe 5 2->14         started        16 dhcpmon.exe 2->16         started        process3 file4 59 C:\Users\user\AppData\Roaming\JLsbuY.exe, PE32 8->59 dropped 61 C:\Users\user\AppData\Local\...\tmp8832.tmp, XML 8->61 dropped 63 APPLICATION FORM M...nskiy NEW U.exe.log, ASCII 8->63 dropped 77 Injects a PE file into a foreign processes 8->77 18 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 1 14 8->18         started        23 schtasks.exe 1 8->23         started        25 schtasks.exe 12->25         started        27 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 12->27         started        29 schtasks.exe 14->29         started        31 dhcpmon.exe 14->31         started        33 schtasks.exe 16->33         started        35 dhcpmon.exe 16->35         started        signatures5 process6 dnsIp7 65 godisgood1.hopto.org 37.139.129.71, 49698, 7712 LVLT-10753US Germany 18->65 53 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->53 dropped 55 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->55 dropped 57 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->57 dropped 75 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->75 37 schtasks.exe 1 18->37         started        39 schtasks.exe 1 18->39         started        41 conhost.exe 23->41         started        43 conhost.exe 25->43         started        45 conhost.exe 29->45         started        47 conhost.exe 33->47         started        file8 signatures9 process10 process11 49 conhost.exe 37->49         started        51 conhost.exe 39->51         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe34%ReversingLabsByteCode-MSIL.Trojan.Woreflint
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe31%VirustotalBrowse
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\JLsbuY.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
C:\Users\user\AppData\Roaming\JLsbuY.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
SourceDetectionScannerLabelLinkDownload
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack100%AviraTR/NanoCore.fadteDownload File
3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
SourceDetectionScannerLabelLink
godisgood1.hopto.org14%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.sajatypeworks.comn-u0%URL Reputationsafe
http://www.founder.com.cn/cnT0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.fontbureau.comessed0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.fontbureau.comiona0%URL Reputationsafe
http://www.fontbureau.comiona0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.fonts.comic0%URL Reputationsafe
http://www.fontbureau.comcom0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.de0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.founder.com.cn/cnr-f0%URL Reputationsafe
http://www.fontbureau.comF0%URL Reputationsafe
http://www.agfamonotype.0%URL Reputationsafe
http://www.founder.com.c0%URL Reputationsafe
http://www.tiro.comn0%URL Reputationsafe
http://www.fontbureau.comd0%URL Reputationsafe
http://en.w0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.fontbureau.comituF0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.fontbureau.comm0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.tiro.comc0%URL Reputationsafe
godisgood1.hopto.org14%VirustotalBrowse
http://www.fontbureau.comFV0%Avira URL Cloudsafe
http://www.fonts.comibi0%Avira URL Cloudsafe
http://www.fontbureau.comepkoH0%Avira URL Cloudsafe
godisgood1.hopto.org100%Avira URL Cloudmalware
http://www.founder.com.cn/cnsH0%Avira URL Cloudsafe
http://www.agfamonotype.~SBIm0%Avira URL Cloudsafe
http://www.founder.com.cn/cn#H40%Avira URL Cloudsafe
http://www.fontbureau.comcomFH0%Avira URL Cloudsafe
http://www.fontbureau.comdd0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/om0%Avira URL Cloudsafe
http://www.fonts.comS0%Avira URL Cloudsafe
185.225.73.164100%Avira URL Cloudmalware
http://www.urwpp.derT0%Avira URL Cloudsafe
http://www.urwpp.deJ(0%Avira URL Cloudsafe
http://www.fonts.comical0%Avira URL Cloudsafe
http://www.sandoll.co.krXH.0%Avira URL Cloudsafe
http://www.sandoll.co.krend0%Avira URL Cloudsafe
http://www.founder.com.cn/cnoH%0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
godisgood1.hopto.org
37.139.129.71
truetrueunknown
NameMaliciousAntivirus DetectionReputation
godisgood1.hopto.orgtrue
  • 14%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
185.225.73.164true
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.fontbureau.com/designersGAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comFVAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.fontbureau.com/designers/?APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.founder.com.cn/cn/bTheAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.founder.com.cn/cnsHAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.com/designers?APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.sajatypeworks.comn-uAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cnTAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.tiro.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designersAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.comessedAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.goodfont.co.krAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://google.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpfalse
            high
            http://www.fontbureau.comepkoHAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comionaAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.sajatypeworks.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303715113.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303588332.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303452217.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303515704.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.typography.netDAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cTheAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://fontfabrik.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fonts.comicAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fonts.comibiAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comcomAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/DPleaseAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.agfamonotype.~SBImAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.fonts.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.sandoll.co.krAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deDPleaseAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000A.00000002.480986509.0000000002974000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.sakkal.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn#H4APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.founder.com.cn/cn/omAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307564401.0000000005514000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.founder.com.cn/cnr-fAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comFAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311387611.0000000005518000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.agfamonotype.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comnAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304268623.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304202190.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comddAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comcomFHAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fonts.comSAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comdAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://en.wAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303119536.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comlAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.derTAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comituFAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307654597.000000000551B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307572542.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.urwpp.deJ(APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.com/designers/frere-user.htmlAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comicalAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303629841.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312451749.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krXH.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.commAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sandoll.co.krendAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comcAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnoH%APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            37.139.129.71
                            godisgood1.hopto.orgGermany
                            10753LVLT-10753UStrue
                            Joe Sandbox Version:36.0.0 Rainbow Opal
                            Analysis ID:714049
                            Start date and time:2022-10-01 12:41:07 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 54s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@30/15@3/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 169
                            • Number of non-executed functions: 3
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            12:42:11API Interceptor724x Sleep call for process: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe modified
                            12:42:23Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" s>$(Arg0)
                            12:42:24AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            12:42:26Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                            12:42:54API Interceptor2x Sleep call for process: dhcpmon.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            37.139.129.71HbLvbvoRGy.exeGet hashmaliciousBrowse
                              7IcZgRDScI.exeGet hashmaliciousBrowse
                                1p1zjEapac.exeGet hashmaliciousBrowse
                                  dSgT0bXySX.exeGet hashmaliciousBrowse
                                    6myXWYz7OB.exeGet hashmaliciousBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      godisgood1.hopto.orgBL No.KTOHRYGN2202 (SURRENDERED BL).exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      SecuriteInfo.com.W32.MSIL_Kryptik.DSR.gen.Eldorado.17895.exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      CV.exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      SecuriteInfo.com.W32.AIDetectNet.01.5406.16871.exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      SecuriteInfo.com.W32.AIDetectNet.01.20138.17534.exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      DISCHARGE CERTIFICATE 25.08.2022.exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      SecuriteInfo.com.W32.AIDetectNet.01.28680.exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      RFQ No. 6000091641.exeGet hashmaliciousBrowse
                                      • 185.225.73.164
                                      HSS.exeGet hashmaliciousBrowse
                                      • 2.56.59.46
                                      uI81n5kpR3.exeGet hashmaliciousBrowse
                                      • 2.56.57.143
                                      Mj7iuWXSYN.xlsxGet hashmaliciousBrowse
                                      • 2.56.57.143
                                      5vKNZrbp4s.exeGet hashmaliciousBrowse
                                      • 2.56.57.143
                                      T6k46JoFBs.exeGet hashmaliciousBrowse
                                      • 37.0.11.250
                                      ALP.exeGet hashmaliciousBrowse
                                      • 185.174.101.21
                                      INVOICE = 212888585 .xlsxGet hashmaliciousBrowse
                                      • 103.147.184.84
                                      kGIBTCae7v.exeGet hashmaliciousBrowse
                                      • 103.156.91.208
                                      Vs57n7RHgP.exeGet hashmaliciousBrowse
                                      • 103.156.91.208
                                      v5rJN9eflV.exeGet hashmaliciousBrowse
                                      • 103.89.90.65
                                      VzzCzKHwT5.exeGet hashmaliciousBrowse
                                      • 103.167.85.222
                                      TT COPY.xlsxGet hashmaliciousBrowse
                                      • 103.167.85.222
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      LVLT-10753USW9CVetN5r3.elfGet hashmaliciousBrowse
                                      • 148.57.62.62
                                      7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exeGet hashmaliciousBrowse
                                      • 193.56.146.36
                                      Revised PO-2022092903_________________________.exeGet hashmaliciousBrowse
                                      • 185.252.178.35
                                      YVw7dMcj8V.exeGet hashmaliciousBrowse
                                      • 37.139.129.221
                                      Revised PO-2022091803____________________________.vbsGet hashmaliciousBrowse
                                      • 185.252.178.35
                                      ieI2DZPujw.exeGet hashmaliciousBrowse
                                      • 37.139.129.221
                                      Swift Copy.exeGet hashmaliciousBrowse
                                      • 185.252.178.35
                                      image001.exeGet hashmaliciousBrowse
                                      • 185.252.178.35
                                      7xcnQ2Jwq7.exeGet hashmaliciousBrowse
                                      • 185.252.178.116
                                      Shipping Documents.exeGet hashmaliciousBrowse
                                      • 185.252.178.35
                                      New Order.exeGet hashmaliciousBrowse
                                      • 185.252.178.35
                                      Shipment Document BL,INV and packing list.jpg.exeGet hashmaliciousBrowse
                                      • 37.139.129.142
                                      arm6-20220925-1655.elfGet hashmaliciousBrowse
                                      • 185.252.178.48
                                      xf2HwbP8Tn.elfGet hashmaliciousBrowse
                                      • 185.252.178.159
                                      C4Loader.exeGet hashmaliciousBrowse
                                      • 37.139.129.113
                                      BPL_1000572_007.bat.exeGet hashmaliciousBrowse
                                      • 185.252.178.63
                                      Specifications_Details_RFQ.exeGet hashmaliciousBrowse
                                      • 185.252.178.63
                                      Specifications_Details_350_RFQ.exeGet hashmaliciousBrowse
                                      • 185.252.178.63
                                      image001.exeGet hashmaliciousBrowse
                                      • 185.252.178.35
                                      Specifications_Details_30200_RFQ.exeGet hashmaliciousBrowse
                                      • 185.252.178.63
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1189376
                                      Entropy (8bit):6.94809823392214
                                      Encrypted:false
                                      SSDEEP:24576:LrArSrrSV1DCOzMFd1bFfxR6ImZlNRU3jrx:OV/+9fxAXU
                                      MD5:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      SHA1:1FB0C57D1EA566B703BE21A5DD2334166F5A918E
                                      SHA-256:F360431BC55CE6BBBD77F26A9BCB86B6267C3B82220D06EE4C67B44BE2273735
                                      SHA-512:18401E658D3D97A845D8ED05A750EB702337D9C4E1D25CCEDC5A6024BEB09CC333668C6F16A60E11523E79908DCD5D7D439A396724B9D5329D44648F6996FDC7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 37%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c..............P............../... ...@....@.. ....................................@.....................................O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B........................H........Q..dq......B........k............................................(....*&..(.....*.s ........s!........s"........s#........s$........*...0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0..<........~.....(*.....,!r...p.....(+...o,...s-............~.....+..*.0...........~.....+..*".......*.0..&........(....r#..p~....o....(/.....t$....+..*...0..&........(....r5..p~....o....(/.....
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1639
                                      Entropy (8bit):5.179579532436944
                                      Encrypted:false
                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                                      MD5:434B39DEA1D167EF66A3D88C5E1B052F
                                      SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                                      SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                                      SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1639
                                      Entropy (8bit):5.179579532436944
                                      Encrypted:false
                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                                      MD5:434B39DEA1D167EF66A3D88C5E1B052F
                                      SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                                      SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                                      SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1639
                                      Entropy (8bit):5.179579532436944
                                      Encrypted:false
                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                                      MD5:434B39DEA1D167EF66A3D88C5E1B052F
                                      SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                                      SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                                      SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1335
                                      Entropy (8bit):5.131538419856332
                                      Encrypted:false
                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Y8dxtn:cbk4oL600QydbQxIYODOLedq3odj
                                      MD5:B9DEE575F2B0ACDC2037D92C74DC29BB
                                      SHA1:037CA9A5B3612ADEB251AE4D780CD0D0C5053DCB
                                      SHA-256:8036080B940A7BD8C425649914CCBBA4A4DCF3AABA3023DFAD249BD89F36F4F7
                                      SHA-512:3970ADE224745201DC6C3FB65E57083B136C53088B212FF1F801388876BB7A3B744B777A1138673BC294614244BA564F39499C865F437221293085BBA334C4C4
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1639
                                      Entropy (8bit):5.179579532436944
                                      Encrypted:false
                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                                      MD5:434B39DEA1D167EF66A3D88C5E1B052F
                                      SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                                      SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                                      SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1310
                                      Entropy (8bit):5.109425792877704
                                      Encrypted:false
                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                      MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                      SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                      SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                      SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):232
                                      Entropy (8bit):7.089541637477408
                                      Encrypted:false
                                      SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                                      MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                                      SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                                      SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                                      SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                                      Malicious:false
                                      Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:Non-ISO extended-ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):8
                                      Entropy (8bit):3.0
                                      Encrypted:false
                                      SSDEEP:3:DCg:z
                                      MD5:5A6FF3DF7B2CB03AA295AE6A3C2728C6
                                      SHA1:656CE7D1794A14D6E749316CBD0BD00AA2DF9D8F
                                      SHA-256:08F3C75923C4CC4BD40D01FB1D98198307914B0841B9CBD4008F21E4BE5323A2
                                      SHA-512:D55DF6007CDE0465EB462FDE244FC7707D640179C42499CC20737402E2EE19D50CC12C875531977894F403478024E15EE086FA9ECBC5A827E9378BCC43C873EA
                                      Malicious:true
                                      Preview:.;g....H
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):327768
                                      Entropy (8bit):7.999367066417797
                                      Encrypted:true
                                      SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                                      MD5:2E52F446105FBF828E63CF808B721F9C
                                      SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                                      SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                                      SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                                      Malicious:false
                                      Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):72
                                      Entropy (8bit):4.867861029749889
                                      Encrypted:false
                                      SSDEEP:3:oNt+WfWk1Q9PFB8j+nXIMLWA2LN:oNwvk1QRsj+nXxix
                                      MD5:2D2969AF6342D4C42632BBEA0FAAB3C1
                                      SHA1:533268FF8603A9705BDB38DB60CB2D795E754A30
                                      SHA-256:B2ACA0EE9C8564A59BF6F15F82FDD183486916F18F1E333243E285A8E9957F47
                                      SHA-512:4C0B9ED26CBD070D9542F258957F4436F0CEECD032D3A8582708B97DF53AB536AD664195C1AAA5D24EDD983ABFA135AD90C0535C99EDFC174274F5569CFDDDE5
                                      Malicious:false
                                      Preview:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1189376
                                      Entropy (8bit):6.94809823392214
                                      Encrypted:false
                                      SSDEEP:24576:LrArSrrSV1DCOzMFd1bFfxR6ImZlNRU3jrx:OV/+9fxAXU
                                      MD5:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      SHA1:1FB0C57D1EA566B703BE21A5DD2334166F5A918E
                                      SHA-256:F360431BC55CE6BBBD77F26A9BCB86B6267C3B82220D06EE4C67B44BE2273735
                                      SHA-512:18401E658D3D97A845D8ED05A750EB702337D9C4E1D25CCEDC5A6024BEB09CC333668C6F16A60E11523E79908DCD5D7D439A396724B9D5329D44648F6996FDC7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 37%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c..............P............../... ...@....@.. ....................................@.....................................O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B........................H........Q..dq......B........k............................................(....*&..(.....*.s ........s!........s"........s#........s$........*...0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0..<........~.....(*.....,!r...p.....(+...o,...s-............~.....+..*.0...........~.....+..*".......*.0..&........(....r#..p~....o....(/.....t$....+..*...0..&........(....r5..p~....o....(/.....
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.94809823392214
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      File size:1189376
                                      MD5:c5ca6bf1a4d668abae8a1bd58da7fa89
                                      SHA1:1fb0c57d1ea566b703be21a5dd2334166f5a918e
                                      SHA256:f360431bc55ce6bbbd77f26a9bcb86b6267c3b82220d06ee4c67b44be2273735
                                      SHA512:18401e658d3d97a845d8ed05a750eb702337d9c4e1d25ccedc5a6024beb09cc333668c6f16a60e11523e79908dcd5d7d439a396724b9d5329d44648f6996fdc7
                                      SSDEEP:24576:LrArSrrSV1DCOzMFd1bFfxR6ImZlNRU3jrx:OV/+9fxAXU
                                      TLSH:AA453A1425DA4B1EF07E8BF91BD4A4E54BFAE622A329E5FA3DE043850722F01CDC1576
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c..............P............../... ...@....@.. ....................................@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x522f16
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6337A6B5 [Sat Oct 1 02:32:21 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x122ec40x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1240000x11c8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x120f1c0x121000False0.6100981293252595data6.951369793482402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x1240000x11c80x1200False0.3919270833333333data5.051703971077691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x1260000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0x1240900x30cdata
                                      RT_MANIFEST0x1243ac0xe15XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      37.139.129.71192.168.2.47712496982841753 10/01/22-12:42:35.121312TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)77124969837.139.129.71192.168.2.4
                                      192.168.2.437.139.129.714969877122025019 10/01/22-12:42:30.424505TCP2025019ET TROJAN Possible NanoCore C2 60B496987712192.168.2.437.139.129.71
                                      192.168.2.437.139.129.714969877122816766 10/01/22-12:42:35.951752TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496987712192.168.2.437.139.129.71
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 1, 2022 12:42:30.048540115 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.076286077 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.076489925 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.424504995 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.472449064 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.546344995 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.588115931 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.755649090 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.817027092 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.916877985 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.944308996 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.950195074 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.950231075 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.950248957 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.950268984 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.950289011 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.950340033 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.979064941 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979098082 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979115009 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979135990 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979155064 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979173899 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979190111 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.979191065 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979211092 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:30.979238033 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:30.979262114 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.006762028 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.006822109 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.006844997 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.006867886 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.006910086 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.006932974 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.006952047 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.006956100 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.006979942 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007011890 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007013083 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.007030964 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.007036924 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007062912 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007081032 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.007086992 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007117033 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007127047 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.007141113 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007163048 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.007180929 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.034719944 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034754038 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034774065 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034780979 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.034794092 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034815073 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034821987 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.034836054 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034854889 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034854889 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.034888029 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034893036 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.034914017 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034933090 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034945011 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.034950972 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034970045 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.034981012 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.034990072 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035008907 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035027027 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035031080 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.035058022 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.035059929 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035080910 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035098076 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035113096 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.035115957 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035135984 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035150051 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.035155058 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035173893 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035188913 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.035192966 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035211086 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035223007 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.035229921 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035248995 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035268068 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.035273075 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.035300016 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063040972 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063081980 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063107967 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063133001 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063141108 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063160896 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063178062 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063193083 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063220024 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063230038 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063247919 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063277960 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063285112 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063308001 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063335896 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063344002 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063364983 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063394070 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063411951 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063420057 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063448906 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063457012 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063477039 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063505888 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063513041 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063538074 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063563108 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063587904 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063591003 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063612938 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063622952 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063640118 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063663960 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063668966 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063694000 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063720942 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063729048 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063749075 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063776016 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063782930 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063802958 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063829899 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063837051 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063857079 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063884974 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063894033 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063911915 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063939095 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063946009 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.063966990 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.063993931 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064001083 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064022064 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064049959 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064054966 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064076900 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064104080 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064109087 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064130068 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064157009 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064163923 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064186096 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064213037 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064218044 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064239979 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064268112 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064275026 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064296961 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064327002 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064331055 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064356089 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064383030 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064400911 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.064412117 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.064450979 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092122078 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092155933 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092171907 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092190027 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092204094 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092226028 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092245102 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092263937 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092283964 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092305899 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092328072 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092346907 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092365980 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092371941 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092386007 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092405081 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092425108 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092443943 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092461109 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092462063 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092482090 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092488050 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092500925 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092511892 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092520952 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092535019 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092540026 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092559099 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092576027 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092576981 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092597008 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092611074 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092614889 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092634916 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092647076 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092653036 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092670918 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092685938 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092690945 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092710018 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092722893 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092729092 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092747927 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092763901 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092766047 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092786074 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092803001 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092803001 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092822075 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092839956 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092842102 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092859983 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092871904 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092879057 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092897892 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092916965 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092917919 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092937946 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092953920 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.092956066 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092974901 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092993021 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.092994928 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.093012094 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.093029976 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.093031883 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.093049049 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.093064070 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.093065977 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.093111038 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126379013 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126414061 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126435995 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126456976 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126477957 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126497030 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126514912 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126516104 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126539946 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126559019 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126562119 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126583099 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126584053 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126606941 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126619101 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126629114 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126651049 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126671076 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126677036 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126693010 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126712084 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126713991 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126737118 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126758099 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126763105 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126779079 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126801014 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126807928 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126837969 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126842022 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126868963 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126904964 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126925945 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126955032 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126976967 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.126990080 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.126996994 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127017975 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127032042 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127038956 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127059937 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127070904 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127079964 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127099991 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127110958 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127120018 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127141953 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127151012 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127168894 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127188921 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127199888 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127209902 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127230883 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127243042 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127252102 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127271891 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127283096 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127293110 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127315998 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127326965 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127337933 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127357960 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127377987 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127377987 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127399921 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127410889 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127420902 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127441883 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127454996 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127464056 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127484083 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127496004 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.127505064 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.127545118 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156510115 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156546116 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156572104 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156596899 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156603098 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156621933 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156641960 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156649113 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156680107 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156685114 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156733990 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156774044 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156778097 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156797886 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156826019 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156836987 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156855106 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156882048 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156891108 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156909943 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156935930 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156963110 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.156965017 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.156996012 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157001019 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157023907 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157052040 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157058001 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157078981 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157107115 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157114029 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157134056 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157160997 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157181978 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157186985 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157215118 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157222986 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157242060 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157268047 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157277107 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157294989 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157322884 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157325983 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157347918 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157371998 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157387018 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157397985 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157423019 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157430887 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157449961 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157475948 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157481909 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157501936 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157527924 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157532930 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157553911 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157578945 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157586098 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157604933 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157629967 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157636881 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157658100 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157685041 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157691002 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157711029 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157737017 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157742977 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157763958 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157789946 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157798052 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157814980 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157841921 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157846928 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157866001 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157892942 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157900095 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157917976 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157943964 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157953024 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.157969952 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.157998085 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158003092 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158021927 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158049107 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158056021 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158085108 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158113003 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158119917 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158139944 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158165932 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158174992 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158194065 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158220053 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158231974 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158246994 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158273935 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158282042 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158302069 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158329964 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158343077 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158355951 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158381939 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158390999 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158406973 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158433914 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158441067 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158459902 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158485889 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158497095 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.158512115 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158536911 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:31.158546925 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:31.255629063 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:32.751305103 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:32.839713097 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:35.121311903 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:35.236531019 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:35.951751947 CEST496987712192.168.2.437.139.129.71
                                      Oct 1, 2022 12:42:36.026907921 CEST77124969837.139.129.71192.168.2.4
                                      Oct 1, 2022 12:42:36.570511103 CEST496987712192.168.2.437.139.129.71
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 1, 2022 12:42:30.000255108 CEST5657253192.168.2.48.8.8.8
                                      Oct 1, 2022 12:42:30.021872997 CEST53565728.8.8.8192.168.2.4
                                      Oct 1, 2022 12:42:43.918507099 CEST5091153192.168.2.48.8.8.8
                                      Oct 1, 2022 12:42:43.938385010 CEST53509118.8.8.8192.168.2.4
                                      Oct 1, 2022 12:42:47.465024948 CEST5968353192.168.2.48.8.8.8
                                      Oct 1, 2022 12:42:47.486771107 CEST53596838.8.8.8192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 1, 2022 12:42:30.000255108 CEST192.168.2.48.8.8.80xa928Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)false
                                      Oct 1, 2022 12:42:43.918507099 CEST192.168.2.48.8.8.80xa723Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)false
                                      Oct 1, 2022 12:42:47.465024948 CEST192.168.2.48.8.8.80x2be2Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 1, 2022 12:42:30.021872997 CEST8.8.8.8192.168.2.40xa928No error (0)godisgood1.hopto.org37.139.129.71A (IP address)IN (0x0001)false
                                      Oct 1, 2022 12:42:43.938385010 CEST8.8.8.8192.168.2.40xa723No error (0)godisgood1.hopto.org37.139.129.71A (IP address)IN (0x0001)false
                                      Oct 1, 2022 12:42:47.486771107 CEST8.8.8.8192.168.2.40x2be2No error (0)godisgood1.hopto.org37.139.129.71A (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:12:41:58
                                      Start date:01/10/2022
                                      Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe"
                                      Imagebase:0x110000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:1
                                      Start time:12:42:18
                                      Start date:01/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp
                                      Imagebase:0x10a0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:2
                                      Start time:12:42:18
                                      Start date:01/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7c72c0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:3
                                      Start time:12:42:19
                                      Start date:01/10/2022
                                      Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0x530000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:4
                                      Start time:12:42:23
                                      Start date:01/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp
                                      Imagebase:0x10a0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:5
                                      Start time:12:42:23
                                      Start date:01/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7c72c0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:6
                                      Start time:12:42:23
                                      Start date:01/10/2022
                                      Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" 0
                                      Imagebase:0xcf0000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:low

                                      Target ID:7
                                      Start time:12:42:24
                                      Start date:01/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp
                                      Imagebase:0x10a0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:8
                                      Start time:12:42:25
                                      Start date:01/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7c72c0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:9
                                      Start time:12:42:26
                                      Start date:01/10/2022
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                      Imagebase:0x9a0000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 37%, ReversingLabs
                                      Reputation:low

                                      Target ID:10
                                      Start time:12:42:34
                                      Start date:01/10/2022
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                      Imagebase:0x4b0000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:low

                                      Target ID:13
                                      Start time:12:43:00
                                      Start date:01/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp
                                      Imagebase:0x10a0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:14
                                      Start time:12:43:01
                                      Start date:01/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp
                                      Imagebase:0x10a0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:15
                                      Start time:12:43:01
                                      Start date:01/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7c72c0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:16
                                      Start time:12:43:01
                                      Start date:01/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7c72c0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:17
                                      Start time:12:43:02
                                      Start date:01/10/2022
                                      Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0x9c0000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                      Target ID:18
                                      Start time:12:43:02
                                      Start date:01/10/2022
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0xce0000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                      Target ID:19
                                      Start time:12:43:15
                                      Start date:01/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
                                      Imagebase:0x10a0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language

                                      Target ID:20
                                      Start time:12:43:16
                                      Start date:01/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7c72c0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language

                                      Target ID:21
                                      Start time:12:43:18
                                      Start date:01/10/2022
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0x4f0000
                                      File size:1189376 bytes
                                      MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:12.5%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:150
                                        Total number of Limit Nodes:7
                                        execution_graph 25888 4add708 25890 24866e0 2 API calls 25888->25890 25891 2487161 2 API calls 25888->25891 25889 4add71b 25890->25889 25891->25889 25892 2486620 25893 2486637 25892->25893 25896 2485754 25893->25896 25895 2486644 25897 248575f 25896->25897 25900 2486680 25897->25900 25899 2486b15 25899->25895 25901 248668b 25900->25901 25904 24866b0 25901->25904 25903 2486bfa 25903->25899 25905 24866bb 25904->25905 25906 24866e0 2 API calls 25905->25906 25907 2486cea 25906->25907 25907->25903 25908 248b970 25909 248b9d6 25908->25909 25910 248ba85 25909->25910 25913 248bb20 25909->25913 25916 248bb30 25909->25916 25919 248a3b4 25913->25919 25917 248a3b4 DuplicateHandle 25916->25917 25918 248bb5e 25916->25918 25917->25918 25918->25910 25920 248bb98 DuplicateHandle 25919->25920 25921 248bb5e 25920->25921 25921->25910 25742 4adcaf4 25743 4adcaff 25742->25743 25746 4adcb14 25743->25746 25745 4ade4af 25747 4adcb1f 25746->25747 25748 4ade4e2 25747->25748 25751 24866e0 25747->25751 25765 2487161 25747->25765 25748->25745 25752 24866eb 25751->25752 25754 24873fe 25752->25754 25779 2489578 25752->25779 25782 4adf310 25752->25782 25786 4addf60 25752->25786 25789 4adf300 25752->25789 25793 2489541 25752->25793 25797 4add8cc 25752->25797 25800 2489567 25752->25800 25803 4add8d0 25752->25803 25753 248743c 25753->25748 25754->25753 25806 248b6a8 25754->25806 25812 248b698 25754->25812 25766 248719b 25765->25766 25768 24873fe 25766->25768 25769 4add8cc 2 API calls 25766->25769 25770 2489541 2 API calls 25766->25770 25771 4addf60 2 API calls 25766->25771 25772 4adf300 2 API calls 25766->25772 25773 2489567 2 API calls 25766->25773 25774 2489578 2 API calls 25766->25774 25775 4adf310 2 API calls 25766->25775 25776 4add8d0 2 API calls 25766->25776 25767 248743c 25767->25748 25768->25767 25777 248b698 2 API calls 25768->25777 25778 248b6a8 2 API calls 25768->25778 25769->25768 25770->25768 25771->25768 25772->25768 25773->25768 25774->25768 25775->25768 25776->25768 25777->25767 25778->25767 25780 2489587 25779->25780 25818 2489670 25779->25818 25780->25754 25783 4adf31f 25782->25783 25838 4adf408 25782->25838 25841 4adf418 25782->25841 25783->25754 25844 4addff8 25786->25844 25787 4addf6f 25787->25754 25791 4adf408 2 API calls 25789->25791 25792 4adf418 2 API calls 25789->25792 25790 4adf31f 25790->25754 25791->25790 25792->25790 25795 2489578 2 API calls 25793->25795 25796 2489567 2 API calls 25793->25796 25794 2489556 25794->25754 25795->25794 25796->25794 25799 2489670 2 API calls 25797->25799 25798 4add8de 25798->25754 25799->25798 25802 2489670 2 API calls 25800->25802 25801 2489587 25801->25754 25802->25801 25804 4add8de 25803->25804 25805 2489670 2 API calls 25803->25805 25804->25754 25805->25804 25807 248b6c9 25806->25807 25808 248b6ed 25807->25808 25847 248b848 25807->25847 25851 248b815 25807->25851 25856 248b858 25807->25856 25808->25753 25813 248b6c9 25812->25813 25814 248b6ed 25813->25814 25815 248b848 2 API calls 25813->25815 25816 248b858 2 API calls 25813->25816 25817 248b815 2 API calls 25813->25817 25814->25753 25815->25814 25816->25814 25817->25814 25819 2489683 25818->25819 25821 248969b 25819->25821 25826 24898e8 25819->25826 25830 24898f8 25819->25830 25820 2489693 25820->25821 25822 2489898 GetModuleHandleW 25820->25822 25821->25780 25823 24898c5 25822->25823 25823->25780 25827 248990c 25826->25827 25828 2489931 25827->25828 25834 2488c08 25827->25834 25828->25820 25831 248990c 25830->25831 25832 2488c08 LoadLibraryExW 25831->25832 25833 2489931 25831->25833 25832->25833 25833->25820 25835 2489ad8 LoadLibraryExW 25834->25835 25837 2489b51 25835->25837 25837->25828 25840 2489670 2 API calls 25838->25840 25839 4adf42a 25839->25783 25840->25839 25842 4adf42a 25841->25842 25843 2489670 2 API calls 25841->25843 25842->25783 25843->25842 25846 2489670 2 API calls 25844->25846 25845 4ade007 25845->25787 25846->25845 25850 248b865 25847->25850 25848 248b89f 25848->25808 25850->25848 25860 248a32c 25850->25860 25852 248b82b 25851->25852 25853 248b873 25851->25853 25852->25808 25854 248b89f 25853->25854 25855 248a32c 2 API calls 25853->25855 25854->25808 25855->25854 25857 248b865 25856->25857 25858 248b89f 25857->25858 25859 248a32c 2 API calls 25857->25859 25858->25808 25859->25858 25861 248a337 25860->25861 25863 248c598 25861->25863 25864 248a3f0 25861->25864 25863->25863 25865 248a3fb 25864->25865 25866 248c607 25865->25866 25867 24866e0 2 API calls 25865->25867 25871 248e378 25866->25871 25876 248e390 25866->25876 25867->25866 25868 248c640 25868->25863 25872 248e382 25871->25872 25873 248e3cd 25872->25873 25882 248e6d8 25872->25882 25885 248e6c9 25872->25885 25873->25868 25878 248e3c1 25876->25878 25879 248e40e 25876->25879 25877 248e3cd 25877->25868 25878->25877 25880 248e6d8 2 API calls 25878->25880 25881 248e6c9 2 API calls 25878->25881 25879->25868 25880->25879 25881->25879 25883 2489670 2 API calls 25882->25883 25884 248e6e1 25882->25884 25883->25884 25884->25873 25886 2489670 2 API calls 25885->25886 25887 248e6e1 25886->25887 25887->25873 25922 4adde10 25924 4adde27 25922->25924 25925 4adca90 25922->25925 25926 4adca9b 25925->25926 25928 24866e0 2 API calls 25926->25928 25929 2487161 2 API calls 25926->25929 25927 4added4 25928->25927 25929->25927
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.379182536.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6ce0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cf22d6c2a25e621e937b10d05101a04630f86499c15405b2adf90c438e594e2d
                                        • Instruction ID: ecf2975df402b6ee49615e180903184289d26349cc4d6191b06fb2d7d14d0792
                                        • Opcode Fuzzy Hash: cf22d6c2a25e621e937b10d05101a04630f86499c15405b2adf90c438e594e2d
                                        • Instruction Fuzzy Hash: 4181C2B4E002198FDB48CFEAC884AAEBBB2FF89340F14902AD515BB354D7359941CF54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4ad6898-4ad68d0 call 4ad60f4 4 4ad68d5-4ad68d7 0->4 5 4ad68d9-4ad6918 4->5 6 4ad6950-4ad6988 4->6 14 4ad6949-4ad694f 5->14 15 4ad691a-4ad6943 5->15 15->14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $%Ml$$%Ml$3
                                        • API String ID: 0-2487884870
                                        • Opcode ID: 1ee89f893eec3e462f3f502c7bb9c4064bcf47c81f658e08ee1faebaa145f5e1
                                        • Instruction ID: a6aa37466ec78e36884750d4fd9a363c0640e3fd01b1cef492e2bad3dd82a175
                                        • Opcode Fuzzy Hash: 1ee89f893eec3e462f3f502c7bb9c4064bcf47c81f658e08ee1faebaa145f5e1
                                        • Instruction Fuzzy Hash: F02123306046404FC701EB79E4589AABBF6EF82214B0484ADD15ADB292DB71ED0ACB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 18 4ad0158-4ad0184 19 4ad024e-4ad0252 18->19 20 4ad018a-4ad0191 18->20 21 4ad01f5-4ad0201 20->21 22 4ad0193-4ad0197 20->22 21->19 26 4ad0203-4ad023e 21->26 23 4ad019d-4ad019f 22->23 23->19 25 4ad01a5-4ad01e0 23->25 37 4ad01ea 25->37 38 4ad01e2-4ad01e8 25->38 35 4ad0248 26->35 36 4ad0240-4ad0246 26->36 35->19 36->19 39 4ad01f0-4ad01f4 37->39 38->39
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $%Ml$$%Ml
                                        • API String ID: 0-4130101558
                                        • Opcode ID: dcc47648177778c8952ee17f9fc9070740c97e74773816300094e25ef10c78b8
                                        • Instruction ID: 2230001c104f604b2090b7f56202c44a3cef5d3af58f087396bfa6beb4f1bda2
                                        • Opcode Fuzzy Hash: dcc47648177778c8952ee17f9fc9070740c97e74773816300094e25ef10c78b8
                                        • Instruction Fuzzy Hash: FB2192323141018FE754DF2DD894A6977E2EF99334F1981B9E50ACF7A6DA74EC018B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 40 4ad6889-4ad68d0 call 4ad60f4 44 4ad68d5-4ad68d7 40->44 45 4ad68d9-4ad6918 44->45 46 4ad6950-4ad6988 44->46 54 4ad6949-4ad694f 45->54 55 4ad691a-4ad6943 45->55 55->54
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $%Ml$$%Ml
                                        • API String ID: 0-4130101558
                                        • Opcode ID: e3bbaaf6955be695a815951e7b98aa831474d244a6f6de237625239b4296962d
                                        • Instruction ID: 4084934e3d43f885b91012ace01184bc4320f76a736ec659e7b98db545b705e5
                                        • Opcode Fuzzy Hash: e3bbaaf6955be695a815951e7b98aa831474d244a6f6de237625239b4296962d
                                        • Instruction Fuzzy Hash: 8B212134A002014FD701EB79D4158AABBF6EFC6204701C5B9D556EB792DF30FD0A8B92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 58 2489670-2489685 call 2488ba0 61 248969b-248969f 58->61 62 2489687 58->62 63 24896a1-24896ab 61->63 64 24896b3-24896f4 61->64 111 248968d call 24898e8 62->111 112 248968d call 24898f8 62->112 63->64 69 2489701-248970f 64->69 70 24896f6-24896fe 64->70 65 2489693-2489695 65->61 66 24897d0-2489890 65->66 106 2489898-24898c3 GetModuleHandleW 66->106 107 2489892-2489895 66->107 72 2489711-2489716 69->72 73 2489733-2489735 69->73 70->69 75 2489718-248971f call 2488bac 72->75 76 2489721 72->76 74 2489738-248973f 73->74 78 248974c-2489753 74->78 79 2489741-2489749 74->79 77 2489723-2489731 75->77 76->77 77->74 83 2489760-2489769 call 2488bbc 78->83 84 2489755-248975d 78->84 79->78 89 248976b-2489773 83->89 90 2489776-248977b 83->90 84->83 89->90 91 2489799-24897a6 90->91 92 248977d-2489784 90->92 99 24897a8-24897c6 91->99 100 24897c9-24897cf 91->100 92->91 94 2489786-2489796 call 2488bcc call 2488bdc 92->94 94->91 99->100 108 24898cc-24898e0 106->108 109 24898c5-24898cb 106->109 107->106 109->108 111->65 112->65
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 024898B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 08fbdd25d0d42495df623e26b3b22b0d874569714bd8f06ac7fb58edd836562e
                                        • Instruction ID: be9b86835337f42de2fd9a255f19a3f2fb493c1f377e8b96022de9e6c9896462
                                        • Opcode Fuzzy Hash: 08fbdd25d0d42495df623e26b3b22b0d874569714bd8f06ac7fb58edd836562e
                                        • Instruction Fuzzy Hash: 737111B0A10B059FD724EF2AD1447AABBF1FB88204F00892ED48AD7B50DB74E9058F91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 113 248a3b4-248bc2c DuplicateHandle 115 248bc2e-248bc34 113->115 116 248bc35-248bc52 113->116 115->116
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0248BB5E,?,?,?,?,?), ref: 0248BC1F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 36eafe6f554ae7b7514459476fb5be119a8014f52d5f953a4d438976e0dcdbe7
                                        • Instruction ID: 205e3eeb40bff28a11f64a5e0f360a3d155a700682a2490f5d7d5c1c5d34af42
                                        • Opcode Fuzzy Hash: 36eafe6f554ae7b7514459476fb5be119a8014f52d5f953a4d438976e0dcdbe7
                                        • Instruction Fuzzy Hash: EF2114B5900208EFDB10DF9AD984BEEBBF8EB48324F14841AE915B3310D374A940CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 119 248bb90-248bc2c DuplicateHandle 120 248bc2e-248bc34 119->120 121 248bc35-248bc52 119->121 120->121
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0248BB5E,?,?,?,?,?), ref: 0248BC1F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 600f01cce1b3d11b7ed2610b78b3746a15caaf3a526b7c55b56b5f8cef25e597
                                        • Instruction ID: b7846931a05411cbb9049c3c8b7d7c4a4ef233a9867d005e9f6c41d5f825575a
                                        • Opcode Fuzzy Hash: 600f01cce1b3d11b7ed2610b78b3746a15caaf3a526b7c55b56b5f8cef25e597
                                        • Instruction Fuzzy Hash: 142100B5901208AFDB10CFA9D584AEEBBF4EB48324F14841AE919A3310D778A941CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 124 2488c08-2489b18 126 2489b1a-2489b1d 124->126 127 2489b20-2489b4f LoadLibraryExW 124->127 126->127 128 2489b58-2489b75 127->128 129 2489b51-2489b57 127->129 129->128
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02489931,00000800,00000000,00000000), ref: 02489B42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 5a53b8c61ac6dbd31a237ca28a3c490d7f3b43d7572bd236f623c9688cf485a2
                                        • Instruction ID: aefb092ace91da6b9fcc64386c146c5e1ff4a48c588d55f6e2a7c610af840db8
                                        • Opcode Fuzzy Hash: 5a53b8c61ac6dbd31a237ca28a3c490d7f3b43d7572bd236f623c9688cf485a2
                                        • Instruction Fuzzy Hash: B511FFB69002489BDB10DF9AD448BEEFBF4EB88364F14842AE519A7300C375A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 132 2489ad0-2489b18 133 2489b1a-2489b1d 132->133 134 2489b20-2489b4f LoadLibraryExW 132->134 133->134 135 2489b58-2489b75 134->135 136 2489b51-2489b57 134->136 136->135
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02489931,00000800,00000000,00000000), ref: 02489B42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 5abdf994590b0ad080144986996d9d03a9564aa87cb09568ed34b5af0f0197a4
                                        • Instruction ID: 29418593727fc1ff958d0ef064df23fb3efae9034ede8132706336d65f5959f6
                                        • Opcode Fuzzy Hash: 5abdf994590b0ad080144986996d9d03a9564aa87cb09568ed34b5af0f0197a4
                                        • Instruction Fuzzy Hash: 9011F2B69002099FCB10DF9AD444BDEFBF4EB88324F15842AD519A7310C779A946CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 139 2489850-2489890 140 2489898-24898c3 GetModuleHandleW 139->140 141 2489892-2489895 139->141 142 24898cc-24898e0 140->142 143 24898c5-24898cb 140->143 141->140 143->142
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 024898B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: fc203bccdc30ccf10d5e2d1af1f16cd411d96ca7ec9de09c6ccb43fdddd69b7c
                                        • Instruction ID: 1fb8922de6b05ba3138acb17994ce3d57106f0a3e535015b01cd265600e90f06
                                        • Opcode Fuzzy Hash: fc203bccdc30ccf10d5e2d1af1f16cd411d96ca7ec9de09c6ccb43fdddd69b7c
                                        • Instruction Fuzzy Hash: F811FDB6C0060A8BCB10DF9AD444BDEBBF4EB88224F14842AD419B7300C374A545CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 311 4ad0148-4ad0184 312 4ad024e-4ad0252 311->312 313 4ad018a-4ad0191 311->313 314 4ad01f5-4ad0201 313->314 315 4ad0193-4ad0197 313->315 314->312 319 4ad0203-4ad023e 314->319 316 4ad019d-4ad019f 315->316 316->312 318 4ad01a5-4ad01e0 316->318 330 4ad01ea 318->330 331 4ad01e2-4ad01e8 318->331 328 4ad0248 319->328 329 4ad0240-4ad0246 319->329 328->312 329->312 332 4ad01f0-4ad01f4 330->332 331->332
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $%Ml
                                        • API String ID: 0-826376005
                                        • Opcode ID: 2fb62916f427723e13a2c36dedc1b2ab8c39e5ee3e90e8513ad9e22379b9eebb
                                        • Instruction ID: a4f583a965242a5f79b4bfd6b86da57c7a05554b4b6e8c4560dd852eb51ed64c
                                        • Opcode Fuzzy Hash: 2fb62916f427723e13a2c36dedc1b2ab8c39e5ee3e90e8513ad9e22379b9eebb
                                        • Instruction Fuzzy Hash: D81108363581014FD724CF29DC95AA97BD2EF8A324F0980BAE40ACF396DA34EC018790
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a77089166cb4545ef83e6c97992ba598ca82d1957a18846d543308d5e93c5af
                                        • Instruction ID: e726cfd8f724db0f158b04f1e5087f3e5a53520c456fa1aa346f66790ff866db
                                        • Opcode Fuzzy Hash: 7a77089166cb4545ef83e6c97992ba598ca82d1957a18846d543308d5e93c5af
                                        • Instruction Fuzzy Hash: B9720E31A10609CFCB14EF68C854ADDB7B1FF55304F1182A9D54AAB265EF70AAC9CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 47d93f4201d4091f449ea9a094835911ac45fb2ef1fcaa00151f3ebe1d3f2787
                                        • Instruction ID: f27857633b616d70ff2684b1efb39c85cb2571011e07f2dd97c079702d0873d5
                                        • Opcode Fuzzy Hash: 47d93f4201d4091f449ea9a094835911ac45fb2ef1fcaa00151f3ebe1d3f2787
                                        • Instruction Fuzzy Hash: DF42E631E14619CFDB14EF68C9846DDB7B1FF89304F1186A9D45ABB261EB30AA85CF40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6dc177af4008e407fa8af2f50560e9432cc7a62b6536f8d9a4aff7da0e162c8f
                                        • Instruction ID: 54424ec5382a9f802dce2aff1efe6473e7c30387a03276fb6ae56e6fd1776bd7
                                        • Opcode Fuzzy Hash: 6dc177af4008e407fa8af2f50560e9432cc7a62b6536f8d9a4aff7da0e162c8f
                                        • Instruction Fuzzy Hash: 5C220534A10214CFDB14DF69C994A9DB7F2FF88304F1585A9E90AAB361DB31ED45CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.379182536.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6ce0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09d29af3875750cf7dd27d2ce060fa160ae217a3cb3176d98c251ad604898bd3
                                        • Instruction ID: f3cdbb67aea6f9cf4d0c7ecd3be740d5c748b3972e216795e744702f1c2bb6f7
                                        • Opcode Fuzzy Hash: 09d29af3875750cf7dd27d2ce060fa160ae217a3cb3176d98c251ad604898bd3
                                        • Instruction Fuzzy Hash: A4F13976E10514DFCB54DFAAC8849ADBBF6FF98314B1680A9E515AB361CB30EC41CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca9578245c20bc3cd686bda8df6ba031e7182f7e8db7d9fd28c77ab302cdc93e
                                        • Instruction ID: f6b56973bbf58dbde84d39c82b1e7acbc3eec12142f46bba185861f893bf3c03
                                        • Opcode Fuzzy Hash: ca9578245c20bc3cd686bda8df6ba031e7182f7e8db7d9fd28c77ab302cdc93e
                                        • Instruction Fuzzy Hash: 0DE1D531E046198FDB24DF68C9846EDB7B1FF49304F1586A9D45AAB261EB30BE85CF40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 732741b77594d93b344ee561cd966b9b64cf4b032e120bb290e655421b60be1e
                                        • Instruction ID: eab5f350786876b01e15ddb21ec14e1c50d90f807fd50a3f2482200d9426ed07
                                        • Opcode Fuzzy Hash: 732741b77594d93b344ee561cd966b9b64cf4b032e120bb290e655421b60be1e
                                        • Instruction Fuzzy Hash: 1C910F74A05208DFDB18DFB5D844AAEBFF1EF89304F1184AAE446A7251CB34AC06CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de4cecc9d62fe8a08040b599a0c7254825fd3fcb1e9b0169b88cb28facf99a59
                                        • Instruction ID: 7eb9cf5337b7fc3c71af70c1f6b8c252ec174dda8d162dcb1c621507e96b85b9
                                        • Opcode Fuzzy Hash: de4cecc9d62fe8a08040b599a0c7254825fd3fcb1e9b0169b88cb28facf99a59
                                        • Instruction Fuzzy Hash: 5C816C74E042189FDB18DFA9C854AEEBBF2FF89304F14812ED409AB354DB749905CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 261c311f0a51bceed97a4fbe16ebf63c7d2e2a36acce1bedcef697353522a249
                                        • Instruction ID: 59f9ac74f64451e2a270ae5fdb2e56f3818124fdc7e9d0840e7cf50f0755ac6e
                                        • Opcode Fuzzy Hash: 261c311f0a51bceed97a4fbe16ebf63c7d2e2a36acce1bedcef697353522a249
                                        • Instruction Fuzzy Hash: DA41AE357005049FDB05DF64C958AAE7BF6EF89300F1180A9E906EB3A2DB39ED05CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bad691ff55ad9d2ad1a7699cdb9bd7a6f68c56242fde7f5e7b0418d39d861a9b
                                        • Instruction ID: 45c7c3675eade3b04ede027d36796b914d56e1b71d3c7c012caea680265f261d
                                        • Opcode Fuzzy Hash: bad691ff55ad9d2ad1a7699cdb9bd7a6f68c56242fde7f5e7b0418d39d861a9b
                                        • Instruction Fuzzy Hash: DA711831B102588FDF45EBB8C58499DB7F2BF88208F158669E506AB350EB35FD81CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ffb78d9dca878d69993f506151f04bc4bbe57a14f28d6bb2e7a2b2415d4039b
                                        • Instruction ID: 3c0a7edd148782fa3f677436c21431eb0b3c26fc715a15b0b6b1e0f2c9c53f89
                                        • Opcode Fuzzy Hash: 8ffb78d9dca878d69993f506151f04bc4bbe57a14f28d6bb2e7a2b2415d4039b
                                        • Instruction Fuzzy Hash: 0991E77190060ADFCB41DF68C880999FBF5FF59310B15879AE819EB256EB70E985CF80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e973f08b7e149e09f132ba6e1d7ba7e1f6940c7aa1d713a8b21c1a42e42461ec
                                        • Instruction ID: b6eb850a4585bd2178b01ccfa93c80fa8ffb2e829714afa364b0cce2612b11d6
                                        • Opcode Fuzzy Hash: e973f08b7e149e09f132ba6e1d7ba7e1f6940c7aa1d713a8b21c1a42e42461ec
                                        • Instruction Fuzzy Hash: 555100757042449FDB18EBA8C8445BF7BF6EB8A308B118169E54ADB391CB34DC068BD6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5173af8a1388bb2bfa041952775403fe44cf29534efcc76017400faa1110788b
                                        • Instruction ID: 9df68a0e09de0f87688578dd265d2514f69bf2968345a9f1d4e2d5b9231d690c
                                        • Opcode Fuzzy Hash: 5173af8a1388bb2bfa041952775403fe44cf29534efcc76017400faa1110788b
                                        • Instruction Fuzzy Hash: 2971BD79600A008FC718DF29C598959BBF2FF89604B1589A9E54ACB372DB72EC41CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e461dc31c304c9bd645cd4cac0fd78d967c4f6f4910717fdab2d83dc1cfd54e
                                        • Instruction ID: 50d99d68515733a59a60fdacfca78c455a50bf491319102f38a05d98518903e8
                                        • Opcode Fuzzy Hash: 8e461dc31c304c9bd645cd4cac0fd78d967c4f6f4910717fdab2d83dc1cfd54e
                                        • Instruction Fuzzy Hash: 2971CEB9600A008FC718DF29C598959BBF2FF89604B1589A9E54ACB372DB71EC45CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d41c22031055480da5cf4b7cc56b40b50826f927a0148224b05dafc39e4202e
                                        • Instruction ID: 2529dcc3a5b5ca69acda218b2715ad9951b24710d09da7d2769e691a7e5c6105
                                        • Opcode Fuzzy Hash: 0d41c22031055480da5cf4b7cc56b40b50826f927a0148224b05dafc39e4202e
                                        • Instruction Fuzzy Hash: 2371A475A046068FCB44CF69C584A99FBF1FF4D314B1986A9E80ADB312E774E885CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e5d5951386750338d3cc39a50253ead8deae3c506cd58dccc1ba6086acea04b
                                        • Instruction ID: ad688ab591cf353be53377fc69695cc5bd1a9bda12324af9a204042c1063a8c9
                                        • Opcode Fuzzy Hash: 9e5d5951386750338d3cc39a50253ead8deae3c506cd58dccc1ba6086acea04b
                                        • Instruction Fuzzy Hash: E7615930A106008FDB14EF69C494B99B7E2EF89314F1685BCD91AAB3A1DB31EC05CB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ebe5394b07e3cc257a6340c85b945b358476e81e77ed2ab6516e9bad8221b56a
                                        • Instruction ID: 25a92199e851d229170ca29fe5a174e369904671434bff554ac1373e8b31e24d
                                        • Opcode Fuzzy Hash: ebe5394b07e3cc257a6340c85b945b358476e81e77ed2ab6516e9bad8221b56a
                                        • Instruction Fuzzy Hash: F2516270E042059FDB14EFA9C944AAFBBF5EF88304F108529D41AE7250DB74A905CFE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 596d29702ef51db0f5f97b168406caa233205f3747fa769acfb60c0a41bbd6ac
                                        • Instruction ID: e1d879cd6798916d32fe685b1e412b81ac4d19c944935fbf260866a4a5e3514f
                                        • Opcode Fuzzy Hash: 596d29702ef51db0f5f97b168406caa233205f3747fa769acfb60c0a41bbd6ac
                                        • Instruction Fuzzy Hash: 85513A31A102589FDF15EBB8C5449ACFBF2BF89308B158169E5069B361EB30FD45CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fc27e041b0d163e8041ddecd0a3e9c80e484ded5143605e0368a092cc546d0c0
                                        • Instruction ID: f27dc4730d123c86515d3bc68bdef8b841dadcdf9ad700210de6eff45923e7fe
                                        • Opcode Fuzzy Hash: fc27e041b0d163e8041ddecd0a3e9c80e484ded5143605e0368a092cc546d0c0
                                        • Instruction Fuzzy Hash: B8515E35A10709CFCB04EF64D8949EDF7B6FF89314F018559E51AAB264EB70AD46CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4236ae77834056371d06228d09eba5eb49611fb471a5e06ab2f1bae21da07f2
                                        • Instruction ID: f9edbb2c64958afbff962ba9cd963a99e086004c6e24ac52e5bef9f654248a9c
                                        • Opcode Fuzzy Hash: d4236ae77834056371d06228d09eba5eb49611fb471a5e06ab2f1bae21da07f2
                                        • Instruction Fuzzy Hash: 1341E2387082505FEB19A73985285BE37E69FCD618716807DDA0ACB794DF24ED0283E6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bdb87e9e6a865b33c29c61d02e8f270f6805924e0b4baf284dab282c5dc269ab
                                        • Instruction ID: 1bff861caf9115ff3eb2b5562d89996a3e8970a7be20fd6baed04ef42036edbb
                                        • Opcode Fuzzy Hash: bdb87e9e6a865b33c29c61d02e8f270f6805924e0b4baf284dab282c5dc269ab
                                        • Instruction Fuzzy Hash: 50512C7190070ACFCB01DF68C880999FBB5FF59310B15975AE85AEB256EB70E985CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db7785b824caf4dff1e148344dae5c480133fe887a5473535d06b6f4436dc94c
                                        • Instruction ID: 892a988f9bff1a9854e08123287af1ff53b265c8127a0191b233729157ac8545
                                        • Opcode Fuzzy Hash: db7785b824caf4dff1e148344dae5c480133fe887a5473535d06b6f4436dc94c
                                        • Instruction Fuzzy Hash: EA41D871B10B018FDB24DF68D99166BB3F2FB48314F184A39E567CB640EB64F9488B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d1c10c66c0a6c492774cbea9cfa96ffd2b3bb35e80d33faf9fa545d78ca707b0
                                        • Instruction ID: abee20bb8f5d686d58aa30122d5c35da453b189bdbf65489bff8d775cecd2db5
                                        • Opcode Fuzzy Hash: d1c10c66c0a6c492774cbea9cfa96ffd2b3bb35e80d33faf9fa545d78ca707b0
                                        • Instruction Fuzzy Hash: 49411B75B10B018FDB24CF78D88165BB7F2BB48210B184A29E567CB645E764F9088B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01b7dfbc39392386bbe8f34ac0c9b486f907171075ad34ca225e26ac7f80b267
                                        • Instruction ID: 7ad9eda81b154805100ca18abdc0a5a5f6791f6e98986186f10bff7b6aaee416
                                        • Opcode Fuzzy Hash: 01b7dfbc39392386bbe8f34ac0c9b486f907171075ad34ca225e26ac7f80b267
                                        • Instruction Fuzzy Hash: 134190B5A002089FDB14EFA9C444AAFBBF5EF89314F10842DE51AE7750DB34AD05CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ceac6d673310ccb0ffb9e2855749904a1a9534d523864093cfe1902a22cbb7d
                                        • Instruction ID: 4bf869558ac66334a785fc224d5cd4ee8e05a021fc79e0ce360a8433d8fa878f
                                        • Opcode Fuzzy Hash: 6ceac6d673310ccb0ffb9e2855749904a1a9534d523864093cfe1902a22cbb7d
                                        • Instruction Fuzzy Hash: AF418171E00614CFEB24EBB4C4546EEBBB2EF88219F544529D403BB654DB35A885CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4c52562a113fa7b5e21516354ec5a7ac5647b5a7235014702d98d1099b34bd7
                                        • Instruction ID: 14719d081fddadceeb43d12007ba5e8a1e4c083d33e56067cb34e89db1de4539
                                        • Opcode Fuzzy Hash: c4c52562a113fa7b5e21516354ec5a7ac5647b5a7235014702d98d1099b34bd7
                                        • Instruction Fuzzy Hash: AE5143B1D04208DBDB10CFA9C984ADEBBB5FF58304F648119D44ABB211D771AA4ACF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b44e7778f4ad4955cf448d0534abcfac2c79d5628e63ef31ef538af5f26a4453
                                        • Instruction ID: ac9e9b5e70823bb90bffa1fa72e1f4c9624a9fb2480eba68b7e45d868968d1dd
                                        • Opcode Fuzzy Hash: b44e7778f4ad4955cf448d0534abcfac2c79d5628e63ef31ef538af5f26a4453
                                        • Instruction Fuzzy Hash: D3417131D10B05ABDB10EFA9D8406DDB7B2FFD5300F614629E114BB250EB707945CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1aad91328ee9c2821f775c503f749dcce2f043541e940b42ec10783641aae287
                                        • Instruction ID: bccee50b857d847ddeb1c7337d1004a9dce43e0eab1408dc71e1e6b2253f8723
                                        • Opcode Fuzzy Hash: 1aad91328ee9c2821f775c503f749dcce2f043541e940b42ec10783641aae287
                                        • Instruction Fuzzy Hash: F2315E317005048FDB24EB7DD854AAE77F6EF89625B1505AED61ACB3A0EB31EC02CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 291904fc72e3a1a92493e8eed686fa3b02b0e436f5ca2c13fa0453646843dc51
                                        • Instruction ID: 56c891ab8299abec8795dfff12cab7a4a31fb47f86b8d87d950cc104ef102d5f
                                        • Opcode Fuzzy Hash: 291904fc72e3a1a92493e8eed686fa3b02b0e436f5ca2c13fa0453646843dc51
                                        • Instruction Fuzzy Hash: 18415D31D10B0AABDB50EFA9D84469DB7B2FF95300F614A29E114BB250EBB07985CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d12734f9fec8575d61595d01da19197e2cb47f88bc15db6ddac73d23004a663
                                        • Instruction ID: 988c65088b270100235abd0fd8823a667f991a689efea65353c83736c8081c53
                                        • Opcode Fuzzy Hash: 3d12734f9fec8575d61595d01da19197e2cb47f88bc15db6ddac73d23004a663
                                        • Instruction Fuzzy Hash: 9D410034A10709CFCB04EF68C4949DDB7B6FF89304F118559D5195B364EB71A945CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c43f75c0c83102a1f0a05811de68f5a1560142efc0303aa70774677832f2be72
                                        • Instruction ID: 3761ed9619b0bb2c5661e509caf4e0258112353a01f7a62322e481eaa8b0c60b
                                        • Opcode Fuzzy Hash: c43f75c0c83102a1f0a05811de68f5a1560142efc0303aa70774677832f2be72
                                        • Instruction Fuzzy Hash: 7041E0B1D00209DBDB24DFAAC584ADEBBB5BF48304F658529D449BB210D771AA4ACF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e420fedb1c6d0771c6584997d3f30be80778629232fab75c23895d7c3a4ed4c0
                                        • Instruction ID: 8a9ab6eaa595699b02b48325d0daab142df921a21db0df183e97475fde406dd2
                                        • Opcode Fuzzy Hash: e420fedb1c6d0771c6584997d3f30be80778629232fab75c23895d7c3a4ed4c0
                                        • Instruction Fuzzy Hash: C541E1B1D00208DBDB10DFAAC584ADEBBB5FF48304F658529E449BB210D771AA4ACF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b48159335375dbde1540aa5eb4e784a181d77e17bcfd6e045734be638eb449cd
                                        • Instruction ID: ef68f1a5908f4df7fc56ca9dd415d42cfd81f9d21cec7f50b0d489dfcaec3ea2
                                        • Opcode Fuzzy Hash: b48159335375dbde1540aa5eb4e784a181d77e17bcfd6e045734be638eb449cd
                                        • Instruction Fuzzy Hash: 9F413975A042068FC715CF68C584AA9FBF1FF49310B1586AAE80ADB362E730F845CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f0265127f918134537aed5a816c21e3ed00c8449545811a154b2fd5fd7b60f47
                                        • Instruction ID: ae663e6fd8a429408880cf235259d68476255d603d558cc5f491983ba23a6f19
                                        • Opcode Fuzzy Hash: f0265127f918134537aed5a816c21e3ed00c8449545811a154b2fd5fd7b60f47
                                        • Instruction Fuzzy Hash: C031D4713106008FE730DF28C485A6AB7F6FB84754B144E6AE097CBA68D772F9448B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d74382ccf2c8e9a55dd770ec1c56ca7055efd8602909b58019d6b8bbbb67a80
                                        • Instruction ID: 46155dc35069eee17b30b1095152416fca9ee56d5bddec702ed8f697d45fe488
                                        • Opcode Fuzzy Hash: 2d74382ccf2c8e9a55dd770ec1c56ca7055efd8602909b58019d6b8bbbb67a80
                                        • Instruction Fuzzy Hash: 7F41BFB4D042589BDB14CF9AC884ADEFBB5FF88314F24822AE419AB210D7746845CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d6ff708af0f03967c0edc69d1714e236468d91a93b4b5b06693451dcd0600951
                                        • Instruction ID: 7859e24dc4f7c6f8e8bad6cd7a4e96efeb6eb33f6833e191dc18616d2342d4d7
                                        • Opcode Fuzzy Hash: d6ff708af0f03967c0edc69d1714e236468d91a93b4b5b06693451dcd0600951
                                        • Instruction Fuzzy Hash: FF316735B002199FCF04EBA4D9548EDB7F6FF88215B058269E406AB364EF75BD46CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.379182536.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6ce0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2bd825dca71e2b10a61e047bc80678cefcb3162f6c482743fbfcce4258339a6d
                                        • Instruction ID: c1598f07371602ebe0e4bcfd715a81fa0cf24d2effe2b22904cfb8eca95feb14
                                        • Opcode Fuzzy Hash: 2bd825dca71e2b10a61e047bc80678cefcb3162f6c482743fbfcce4258339a6d
                                        • Instruction Fuzzy Hash: B021F2387102104BEB68563698A5A3E26EBDFC6608F15C07CD402CFB94EE29CD41D7C2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e5ee6ced91104bfaa7d5832f20800097438b032afca7845ed7622087b98604f9
                                        • Instruction ID: 25eb21da4f5e5cd733d298d839ae9475684b471c45ffdf42010ef7efc1d3db8c
                                        • Opcode Fuzzy Hash: e5ee6ced91104bfaa7d5832f20800097438b032afca7845ed7622087b98604f9
                                        • Instruction Fuzzy Hash: AA218D70F001555FDB11EFAAC9409AFBBF9EFC8204F10812AE516E7251EB70AA01CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 776dc4a8e5bcc7ce6a1b5e76a41406a128e7744d1e8b0754439ef7da251df87a
                                        • Instruction ID: 7b3c86eebf9854b28c2ed171d093a0f292633f72d70048a8b2e3ca10a8a55332
                                        • Opcode Fuzzy Hash: 776dc4a8e5bcc7ce6a1b5e76a41406a128e7744d1e8b0754439ef7da251df87a
                                        • Instruction Fuzzy Hash: 2D219130E00A15CFEB24EB7484547EEBAB2EF88219F54883DC402BA755DB35A885CBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01fc190924a4a54d706f0560613278320f5cfcb3906caa60f8bb6a97630ff97a
                                        • Instruction ID: c6d481b09f430b1d70e37dd2891f585f41c264d0757929c77f82683b0da09738
                                        • Opcode Fuzzy Hash: 01fc190924a4a54d706f0560613278320f5cfcb3906caa60f8bb6a97630ff97a
                                        • Instruction Fuzzy Hash: 2A21CC71604B419FD734CF38D482AAAB7F2BB49210F050E2AE4ABCB640D774F9058B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c53db5d8f6364e77c65d65394f815b7f4c3c22c1b42f2761efc437a33fc1b885
                                        • Instruction ID: 019f5cddfd5fb4525f7e00df742246b16aa56d8fd394dda54da4c7641c8e14f4
                                        • Opcode Fuzzy Hash: c53db5d8f6364e77c65d65394f815b7f4c3c22c1b42f2761efc437a33fc1b885
                                        • Instruction Fuzzy Hash: 5A316D35A0461A8FCB10DFA9D554BEDBBF0AB88314F1040A5D806FB354DB70AD01CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f58af5bdaa707fe72b06290029d05ef6854e84a01df5e9b59f3b4e79fa12a0cd
                                        • Instruction ID: 9fb12dc31df7f156ebdd14ff0a7caf15c0b4b0d9219245776c98ebda2f8cdd83
                                        • Opcode Fuzzy Hash: f58af5bdaa707fe72b06290029d05ef6854e84a01df5e9b59f3b4e79fa12a0cd
                                        • Instruction Fuzzy Hash: F4218C74610B059FD734CF38D482AAAB7F1FB49210F150E2AE0A7CBA40D774F9059B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b8e23044b29a0e2de6ca550ae8146e5cd8e0f69615babcefe847e5fac239e012
                                        • Instruction ID: 8d3c3e998ee424cef19bd3dfa1e4710e7401798f8f119d0e13a11935cb423875
                                        • Opcode Fuzzy Hash: b8e23044b29a0e2de6ca550ae8146e5cd8e0f69615babcefe847e5fac239e012
                                        • Instruction Fuzzy Hash: 6C21B075A00219EFDB05DFA0D854DEEBBB6FF89304B458529E4027B220DB75B95ACB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5c5f3a8ccb89455b69b9805bb206608845f965408f0f8c07dca5e386c5994961
                                        • Instruction ID: 831733a32084b50eb4644a54d201d3f6332423a7cfb6fb3b2d7660dadb7863de
                                        • Opcode Fuzzy Hash: 5c5f3a8ccb89455b69b9805bb206608845f965408f0f8c07dca5e386c5994961
                                        • Instruction Fuzzy Hash: 7021C375E042198FDF05DFF888809EEBBF6EF88204B14402AD509F7355EB34AA058BA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4578f3ed3a51344854c6d8b6a3d97a18f7aecd47d758dd7bdc81cb555483c80a
                                        • Instruction ID: d24f18d847c3c88e30262898e08382e38af575e3de9234429e81cedc234c8759
                                        • Opcode Fuzzy Hash: 4578f3ed3a51344854c6d8b6a3d97a18f7aecd47d758dd7bdc81cb555483c80a
                                        • Instruction Fuzzy Hash: E521E331310A008FD720DF29D485A2AB7F6FF856147194E6AE09BCBA28D762F9058B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 40a61a07b18e5ec377a7fd35ee801dd30e787101c991d252091238b62eaea5c0
                                        • Instruction ID: d4a5eed7a06d020f3d4c24704095cd1eb57eac69e7a2c7fd272dde0c20b64a67
                                        • Opcode Fuzzy Hash: 40a61a07b18e5ec377a7fd35ee801dd30e787101c991d252091238b62eaea5c0
                                        • Instruction Fuzzy Hash: 9C21F436A042059FD318FB69D40879EBBB1DB89214F0088A9C956DB3D2DB74AD0ACBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7fcaedd658be0a1a414e2e5567d241f183dce1404050c21f45612bc93f5712f
                                        • Instruction ID: 6990495a5656dc176eb9a0ff08e8fad2b2e6ad8dc1b68cda409addaabd4e9289
                                        • Opcode Fuzzy Hash: c7fcaedd658be0a1a414e2e5567d241f183dce1404050c21f45612bc93f5712f
                                        • Instruction Fuzzy Hash: 73212C31A106099FCB10EF69D84099DFBF5FF49311F50C26AE959AB200EB30E998CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f2c3ac40edebca991e60222fb844fabee4234314f2f638aaf25edef525dda9c5
                                        • Instruction ID: 61f72df291a42d7993fa881121f1bf7a16e451ef4e67bdeab37095dcdfe2b292
                                        • Opcode Fuzzy Hash: f2c3ac40edebca991e60222fb844fabee4234314f2f638aaf25edef525dda9c5
                                        • Instruction Fuzzy Hash: 6C21AC75A00219EFDB05EFA0D844DEEBBB6FF89304F058559E002BB220DB75B955CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0c89eb2f74c4f9a25e76b2db9f0df70f1964973bbc0b2ad099fe420f6f8eb5a
                                        • Instruction ID: e51707a39b1c70019735353d9623bcac610c81c8f35fea9b5febe68bec902121
                                        • Opcode Fuzzy Hash: a0c89eb2f74c4f9a25e76b2db9f0df70f1964973bbc0b2ad099fe420f6f8eb5a
                                        • Instruction Fuzzy Hash: 0121F232C18B058BDB00EF79D884059BBB5FF95304315866AE949BB366EF70F991CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5d6003410e77ef4e4ef50b50c1cf8ebef997d0c16cc9aefe5d6d5ebd23e0e75c
                                        • Instruction ID: 06509be6ab790df02b120b785b785674a53ff1daf468e34af18688df111a176c
                                        • Opcode Fuzzy Hash: 5d6003410e77ef4e4ef50b50c1cf8ebef997d0c16cc9aefe5d6d5ebd23e0e75c
                                        • Instruction Fuzzy Hash: 9A210371714B804FD3209B28D88275B77E6FB89740F15486ED186CB692DFB8A8058BA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6fcc1eedaeed745e5f50a54c9d002435c6aeba58d5d8ec044c4d05956f1316f5
                                        • Instruction ID: 3f48f52cdc650384a82368609278bfd7f7cf8cefa8c0df5e690d28764d0afd00
                                        • Opcode Fuzzy Hash: 6fcc1eedaeed745e5f50a54c9d002435c6aeba58d5d8ec044c4d05956f1316f5
                                        • Instruction Fuzzy Hash: 1811B2343105104BEB04BE39D40176E72DBEBC5B18F00442AE542EB7E5CEB5EC4257D9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de7c5d0419fe863a3ad75b0d10c378ac81b9d6d0421202590ddf658f08e171f7
                                        • Instruction ID: 988e2ac6f69c7ce57a99057dd8e959f14c4dd448fd29593967a26d5e4431bea2
                                        • Opcode Fuzzy Hash: de7c5d0419fe863a3ad75b0d10c378ac81b9d6d0421202590ddf658f08e171f7
                                        • Instruction Fuzzy Hash: 0821BE35E0465A8BCB15EFA9D954BDDBBF0AF88304F1440A5D842FB318DB70AD01CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c0081929c548d963ea6495443762c312df568ad55456a1d47cba5a1569a7992
                                        • Instruction ID: 4aebfa833db151db2371fe2d0bac1735acf9e16769124794da0e53bddfdecdf4
                                        • Opcode Fuzzy Hash: 9c0081929c548d963ea6495443762c312df568ad55456a1d47cba5a1569a7992
                                        • Instruction Fuzzy Hash: CE118F343106204BEB04BA7AD41172E72DBEBC9B18F10442AE542EB7E5CEB5EC4157D9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29e21fabc7f548962382b5a0eb226dccaff01671dbd8a0b249889d76489586ed
                                        • Instruction ID: 1da28ce555c057be241f02cda17830b5cb100282ed200d75ec0459388a101a4f
                                        • Opcode Fuzzy Hash: 29e21fabc7f548962382b5a0eb226dccaff01671dbd8a0b249889d76489586ed
                                        • Instruction Fuzzy Hash: 8821F332D14B05CBDB00EF69D84045AB7B5FF953043158669E9497B326EB70F890CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d03e7ccbbc41e9dc4e1d57ea06f85133685cb82b1e6824abd31390243e1f49e3
                                        • Instruction ID: f4a15b6174195f7efba2e9362483335e1148d88686fbed67d7dc8a3ce7aeee80
                                        • Opcode Fuzzy Hash: d03e7ccbbc41e9dc4e1d57ea06f85133685cb82b1e6824abd31390243e1f49e3
                                        • Instruction Fuzzy Hash: 7411B1316006008FD754EF69D484B9DB7E2FF85224F1246BDD11ADB261DB30BD4A8BA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34d06a0ce6065e662f961e2b7e61662ef55b4fe29cb1783414efc60138fb8fbf
                                        • Instruction ID: 7f88f79db9572a4578483c910d610eb78af179a6e6b32f0eb8313e7a699993fb
                                        • Opcode Fuzzy Hash: 34d06a0ce6065e662f961e2b7e61662ef55b4fe29cb1783414efc60138fb8fbf
                                        • Instruction Fuzzy Hash: 2B2127B58043489FCB10DFAAC884BDEBFF4EB59364F14845EE456A7210D378A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3842eadf58c80588789485729b42ec69869fdfa6a473a7cc54db76a4c0dfe507
                                        • Instruction ID: 48d153c6646ed8724450784e52c186079372c693a55c9eab804230c445091d4a
                                        • Opcode Fuzzy Hash: 3842eadf58c80588789485729b42ec69869fdfa6a473a7cc54db76a4c0dfe507
                                        • Instruction Fuzzy Hash: 5811A231F006099FDB10DB75C8446AA7BB59F84224F408629D9479B254EB70F981DBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9591e2c5148863affd6ab8a6378e72eb8ae5f2772ccb7a662d40f9bded60c85
                                        • Instruction ID: 71d6eaa2ed6fab131c8c676cc9730556c37bf4752b5809395fd4c185f516a209
                                        • Opcode Fuzzy Hash: b9591e2c5148863affd6ab8a6378e72eb8ae5f2772ccb7a662d40f9bded60c85
                                        • Instruction Fuzzy Hash: C2012471B042945FDB12ABBCA8510EEBFB6DFC9214B04006ED6069B282CB351A0787A6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2f7d5091000aa42f5e79465968e0fe26efca1fcb2689fcf89a7fc975c95b2407
                                        • Instruction ID: 5c8cfdc0e435c20fb9eb7ab9db89371d26ff638576c27cf017032ac3121d3cef
                                        • Opcode Fuzzy Hash: 2f7d5091000aa42f5e79465968e0fe26efca1fcb2689fcf89a7fc975c95b2407
                                        • Instruction Fuzzy Hash: 1B11A531724B104BD760AB69D481B5B73EBF788740F14882EE187DB790DEB5B8448B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a350e6b01c32d2ab12d5262e0728db612ce077b4fa4f564e120d3de4f1f80d9
                                        • Instruction ID: f910b98268a29c44f4f251505b94944fe0cdd5efcbc37a94589869b4c9899acf
                                        • Opcode Fuzzy Hash: 0a350e6b01c32d2ab12d5262e0728db612ce077b4fa4f564e120d3de4f1f80d9
                                        • Instruction Fuzzy Hash: 49215E72D04B9187EB11DF29D840281B7A1EF95318F198ABACC5D3F346EB717984C7A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a3361392a575b7aa47713d7cae27bc771cca778e19fdff8df87245a0ae056fcf
                                        • Instruction ID: d0a577f06b5ac07b061a563c469f14912ad557d8bbb7bba833ffd492a7cac4ea
                                        • Opcode Fuzzy Hash: a3361392a575b7aa47713d7cae27bc771cca778e19fdff8df87245a0ae056fcf
                                        • Instruction Fuzzy Hash: 2D21E4B59002099FDB10DF9AD884BDEFBF8EB48364F14841AE959B7310D379A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6c439a4686e7efe840e70f30b8f9749a99d4bc4c395c8344e084f69d01f6d5e
                                        • Instruction ID: 11168c090e5e1811f3c813f8be33e117af065b162543f3fc265a13dc01473718
                                        • Opcode Fuzzy Hash: f6c439a4686e7efe840e70f30b8f9749a99d4bc4c395c8344e084f69d01f6d5e
                                        • Instruction Fuzzy Hash: B8114C32D00B5186EB10AF59D840281B7A5EF95324F198A79DD5D3F346EB717984C7A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 429892b36cb48c2b9d886301fe5f8b6b90eddd9e0e16004df1d6b66c4f659da5
                                        • Instruction ID: 683e477ec8ff18d112c61177e178eb68cc3508659d2f910ea1841223c6fd66ff
                                        • Opcode Fuzzy Hash: 429892b36cb48c2b9d886301fe5f8b6b90eddd9e0e16004df1d6b66c4f659da5
                                        • Instruction Fuzzy Hash: 29110875A040069FDB01DF68C809A9B7FF6EB88304F008069E502FB381CB39AD0A8B95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ba29410eca15f043391b58736db13e157ae5843a8359e930858b1f02f8ed8d1
                                        • Instruction ID: 55978f3a13314755673a1289106ea83aef545b260915fccdcc9e42914c81e426
                                        • Opcode Fuzzy Hash: 0ba29410eca15f043391b58736db13e157ae5843a8359e930858b1f02f8ed8d1
                                        • Instruction Fuzzy Hash: 5B11C135A002099BD714EFA5C014BDEB7F2EB88304F5044ACC506A7290CF35AD05CBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4455496e8d06b8191d5cd85c746dc56efbd3113822a562416e20a66bd069ed59
                                        • Instruction ID: 143fb1e3b11e3a681ef89ff08e40ef6330c436cc817506717f4396525de3b3f7
                                        • Opcode Fuzzy Hash: 4455496e8d06b8191d5cd85c746dc56efbd3113822a562416e20a66bd069ed59
                                        • Instruction Fuzzy Hash: 6F01D635B142145FEB09E679D4545EE7FE9DFC9118B04C4AAE809D3201ED74AD478790
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18eef021ab74574c79f570bd9a2a0f00491aa06e8ea5b1f293d1aea1b6a73059
                                        • Instruction ID: dbdbd828127f3a6a8caa208462ec7664c19c4db545a6aee4d5af4ec2c333029f
                                        • Opcode Fuzzy Hash: 18eef021ab74574c79f570bd9a2a0f00491aa06e8ea5b1f293d1aea1b6a73059
                                        • Instruction Fuzzy Hash: D411C46120E3D14FEB125B3198A49A63FB59E43609B0E00DFC486CF9E3D6199C46DBA3
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a8e3a5149da73b147818966f087ccb250bd891ba765155c3877019efa70fd467
                                        • Instruction ID: d5352094294be65ed16bc7c55c88c08faf9055d794815f11f1964f33734bd716
                                        • Opcode Fuzzy Hash: a8e3a5149da73b147818966f087ccb250bd891ba765155c3877019efa70fd467
                                        • Instruction Fuzzy Hash: 3211E1303047504BE740EA28D01539A6796AB82B08F50895ED18ADF7C2CFF66C4A87E6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cad6087eb62f3f2a314841df462e5c56e44385319733006155b2baf22caa5f3
                                        • Instruction ID: 8fc41c1511e3b0a5e6aa64d29d822452d7cd73a0f5a5d29443245dc5c53776f8
                                        • Opcode Fuzzy Hash: 7cad6087eb62f3f2a314841df462e5c56e44385319733006155b2baf22caa5f3
                                        • Instruction Fuzzy Hash: 891104B5D042089FDB10DF9AD448B9EFBF4EB98324F14841AD859B7310D774A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ae1f7088599531e2f5b592710e335788da46f5eb6ebdc5365b676fd471057c1f
                                        • Instruction ID: 445a4aef0b95171d92ccba04c59db930861110e93bc5b42b02bfe0dcec0be585
                                        • Opcode Fuzzy Hash: ae1f7088599531e2f5b592710e335788da46f5eb6ebdc5365b676fd471057c1f
                                        • Instruction Fuzzy Hash: 1B01F235A006148FE710EB79E4053CEBBB5EB88314F00442ADA05D7280EA35A90BCFD0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21514f020a0e15ed512a3d49750154c1df67a33ed40f120cb349eda1a8b936ce
                                        • Instruction ID: 9dc1066d0add4bea3ddc62914298b42c644c4365833d30d994491a316086dbd6
                                        • Opcode Fuzzy Hash: 21514f020a0e15ed512a3d49750154c1df67a33ed40f120cb349eda1a8b936ce
                                        • Instruction Fuzzy Hash: AD1145B5800208CFDB10DF99D488BCEFBF4EB58364F14881AD469A7300D738AA45CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a1a1c4ce6b8341676716ab7fdbfe7a4f95c1adc769e837d71bbfd5bc7397595
                                        • Instruction ID: 8f637fa61d5cbca66423f0801d8a0043df7347a0348bf0c634357845fc8b00bc
                                        • Opcode Fuzzy Hash: 1a1a1c4ce6b8341676716ab7fdbfe7a4f95c1adc769e837d71bbfd5bc7397595
                                        • Instruction Fuzzy Hash: 91018F343055608FEB19E738C15466C7BA1AF8DA18B0641A9DA2A8B361DF24FD03C7E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35fabff5130900519e4ca3e15f9bcbbc1b5064a2610a72321aa5383374f3e946
                                        • Instruction ID: df19b3ceec011ec0fbb67e314ea8e222ada1d2f34e6383627d82331d9be3bd1e
                                        • Opcode Fuzzy Hash: 35fabff5130900519e4ca3e15f9bcbbc1b5064a2610a72321aa5383374f3e946
                                        • Instruction Fuzzy Hash: E11120B5C002498FCB10CFAAD448B8EFBF4EB88324F14841AD459B3210D774A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e91055e2fc8a39cba8fe7d5bf66a440ef87e5c200faf4cb3a330b9a4e58a9356
                                        • Instruction ID: 0ca121f8bec115a2cebac3b5245dbc14d2bd8e1749c9f3f6bb82382f177ecc89
                                        • Opcode Fuzzy Hash: e91055e2fc8a39cba8fe7d5bf66a440ef87e5c200faf4cb3a330b9a4e58a9356
                                        • Instruction Fuzzy Hash: 2B01B1757042018FD704CB69D488AAABBF6FFC8218F1584AAD54AC7362CB70EC0BCB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 46a11000b5df4664a0ad4bb6e6c7e4e0b09c12167d5fb5b6c5da68287d19319b
                                        • Instruction ID: b59a1cb29a64a56b7df85a8eef05b5c4493e75561cf48b5b62768444e5fc00c5
                                        • Opcode Fuzzy Hash: 46a11000b5df4664a0ad4bb6e6c7e4e0b09c12167d5fb5b6c5da68287d19319b
                                        • Instruction Fuzzy Hash: 6301D1326083049EEB20EBB5A8007AB7BEDCB80265F4044EED50AC7691EF31F945C7A5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e04d9ba71698be9ff4c77a7e721cc843822021b58c77fad40050d6ff6c6c38c
                                        • Instruction ID: 8a6238f98e74c8ab166b34385508b65fd2fda07e44528bf14d881b27c0214b38
                                        • Opcode Fuzzy Hash: 0e04d9ba71698be9ff4c77a7e721cc843822021b58c77fad40050d6ff6c6c38c
                                        • Instruction Fuzzy Hash: CFF0F6F64063401FD736AF20A8804D37FB9EA16264305498FE84ACB153E514A80BCB70
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 758a1d83a8ea085ea358584c94ea2158a994602013213c0dd43dc332d98d8e0a
                                        • Instruction ID: 7f543350a5f06aa6240f6b59ca592e698393666f7d50826605964a13aeedf6f5
                                        • Opcode Fuzzy Hash: 758a1d83a8ea085ea358584c94ea2158a994602013213c0dd43dc332d98d8e0a
                                        • Instruction Fuzzy Hash: 991110B59002489FCB10DF99D448BDEBBF4EB48324F14841AE52AA7200D378A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 00d77263140a386e4034a9808b69f7b31ae0d3cf6115ab77500c7c02dadf781e
                                        • Instruction ID: 1037dff150ad0eb257a3efb5ede365f84742f6aa9a3adc0ed6e444a945628651
                                        • Opcode Fuzzy Hash: 00d77263140a386e4034a9808b69f7b31ae0d3cf6115ab77500c7c02dadf781e
                                        • Instruction Fuzzy Hash: 5301D66220D7C01FD302D6799895A86BFA6DB9720470A45DFD185CF1B3D660AC0B83A2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cdaf46f272d6a2880b9358f10f32616e02430967363bfb16145217288a363b4e
                                        • Instruction ID: 03cd0b24b10d1ee90a895f9bb308183e17e754291943d7841746df6e7ba0b8ed
                                        • Opcode Fuzzy Hash: cdaf46f272d6a2880b9358f10f32616e02430967363bfb16145217288a363b4e
                                        • Instruction Fuzzy Hash: B501D471A00045DFDB04DF68C818A9BBBFAEF99704F148069E502FB384CA79AD04CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e7dfa4be01e82190a617b8d0e40c73c3c10ea33dd15e415e1fab06b9f4f7bc98
                                        • Instruction ID: bb145f3a8417602b364397c907f1803f76a23aad8aab9d8ed4fc70d10b3abb5d
                                        • Opcode Fuzzy Hash: e7dfa4be01e82190a617b8d0e40c73c3c10ea33dd15e415e1fab06b9f4f7bc98
                                        • Instruction Fuzzy Hash: 98011771A00A049FE720DF38C445A5BB7F6BB85210F040A29E066CB750DB74FD04CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a29d1a50e918530c7ce7ec5fe7ec09db866c3501e1b7f048c65a59203af4fe0e
                                        • Instruction ID: 0de8f337d87e3941810b06907794be68d2b0289eae16ccaf1ec4d44c20399010
                                        • Opcode Fuzzy Hash: a29d1a50e918530c7ce7ec5fe7ec09db866c3501e1b7f048c65a59203af4fe0e
                                        • Instruction Fuzzy Hash: 1801D270A40A06CFEB24EFB1C0143AE7AB1EF48319F84843DC003BA290DB385884CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 60f5b5f59dc37ec12f1c531ac1f40756c25e16be626985e9e5edc6aff8d85339
                                        • Instruction ID: 8f12f506794a15ffcde81c84f68540b8b546408ceb8f21e053245ea105facc6d
                                        • Opcode Fuzzy Hash: 60f5b5f59dc37ec12f1c531ac1f40756c25e16be626985e9e5edc6aff8d85339
                                        • Instruction Fuzzy Hash: DC014C306007048FD724EF39C54059A77F6BF85308F14C96ED4868B264EB30E941CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e11061444a139b45d613333a429e14fc65520ce4a700b7d18b71985a160cea3
                                        • Instruction ID: 2a470025fa473f12cdb955a02753dbdaa51bf63e329e3df43790dd96efa99b88
                                        • Opcode Fuzzy Hash: 8e11061444a139b45d613333a429e14fc65520ce4a700b7d18b71985a160cea3
                                        • Instruction Fuzzy Hash: 3901DF30605B018FD315EF38C0505AA7BF1AF85308F0486AED8828B269EB30F942CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 28f25583476c6ea58f1a8c42d675eb5816e0d52f9bdc7402a2427e6ce15bd5fa
                                        • Instruction ID: bc9ec907a015dd5d753d32bca76743a9bdb23ef26584cf823c9ba0b046a6ba11
                                        • Opcode Fuzzy Hash: 28f25583476c6ea58f1a8c42d675eb5816e0d52f9bdc7402a2427e6ce15bd5fa
                                        • Instruction Fuzzy Hash: C201B1303147505BE680AA29C01579A76DBAB81708F10891DD18ADB3C2CFF7BC4A8BE5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1ec00d46ac2a50f475d138f58cf51a77ac48215c12e8624294758c40c24625de
                                        • Instruction ID: 870517a920ff60abec4b29439f2ba37c8d65a34530fb6a65a7ca481623bde0e5
                                        • Opcode Fuzzy Hash: 1ec00d46ac2a50f475d138f58cf51a77ac48215c12e8624294758c40c24625de
                                        • Instruction Fuzzy Hash: F601D139A147008BCB12BB78D5101EEBB75EFC6228F04059ED98A5B241EF70A647C7D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8fc80803ba72b596b39db8b894a100701fd754f7fd44fa82a8e2ffc280bc2733
                                        • Instruction ID: d51770c0701acc84802fef2a3bfd99b6ba5f547b3f1702c4965f2235f5954b31
                                        • Opcode Fuzzy Hash: 8fc80803ba72b596b39db8b894a100701fd754f7fd44fa82a8e2ffc280bc2733
                                        • Instruction Fuzzy Hash: 6901E535600B048BD324DF28D045A56B7F6FB89294B040E29E1A7CB744DB70F9098BD0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 806afbbcc430bc8ed21cc444d4643e8f30621da648a8f0dd2f24a22998150ef2
                                        • Instruction ID: d8a0742b5440f88de75959f4d11e6564cb7189f549eba0d04f1c7e38c745b194
                                        • Opcode Fuzzy Hash: 806afbbcc430bc8ed21cc444d4643e8f30621da648a8f0dd2f24a22998150ef2
                                        • Instruction Fuzzy Hash: 8A01A772509380DFC3028B64E800585BFB1EF96214B1AC4EBD5898F173D23A9957DB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d46fda503c1c4a230425b0a816028d37c8a9da8b4c81be453c1941a755ed65b
                                        • Instruction ID: e24f676e3298fff21b2985363c9a53733a8981baac28689c0706a72c7c190a09
                                        • Opcode Fuzzy Hash: 9d46fda503c1c4a230425b0a816028d37c8a9da8b4c81be453c1941a755ed65b
                                        • Instruction Fuzzy Hash: BD0181347042108FD714DB6AD488E6AB7EAFFC8318B15846AE51AC7361CB70FC05CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5b28c6fc4a70f117f01269904602f4726bbbcfcff28a7a0af9f90f04cc46fc19
                                        • Instruction ID: f641ff3504d31d2d92ba5b22916e7dd882f7198e90eabf2a9be0b7bd792488d0
                                        • Opcode Fuzzy Hash: 5b28c6fc4a70f117f01269904602f4726bbbcfcff28a7a0af9f90f04cc46fc19
                                        • Instruction Fuzzy Hash: A8F0BB71B001149B9F1577EC59504FFBBBAEBC8514B000029D506A7340CF362D0287E9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee0646cfda76623d060ac031f5f3e6042c6395e8a1ee8156270d56081ad22caf
                                        • Instruction ID: ba0e852d9ff1d8fd9f76db13969e5b8b373d374916553fdfd2861f0ceea9dcef
                                        • Opcode Fuzzy Hash: ee0646cfda76623d060ac031f5f3e6042c6395e8a1ee8156270d56081ad22caf
                                        • Instruction Fuzzy Hash: 00F0F672A145659BEB14EF75EC405BFB7F6FFC0625B058A3BD015DB290EA706801C394
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 22452b0ce5e9d9332a78db066f401325bcb9a81e05694b4dc8e3869ccc14feb1
                                        • Instruction ID: 8807d40ce1a8f36d4bb2c0d64a1077942ce2775d5b79cbd1515b3f7e7a1a2e79
                                        • Opcode Fuzzy Hash: 22452b0ce5e9d9332a78db066f401325bcb9a81e05694b4dc8e3869ccc14feb1
                                        • Instruction Fuzzy Hash: D6F054327046155F9614DB6AE88485AB7AAEBD52293054A7EE20AC7321CF71ED068790
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e454243761f8335abd50ec9077b0c68425b12d8faa3768b0a5997faa2fc7e04
                                        • Instruction ID: 852e5071d34d687258de14f084e65679b3ae5c2d60fbfc787751f169c9c793ed
                                        • Opcode Fuzzy Hash: 2e454243761f8335abd50ec9077b0c68425b12d8faa3768b0a5997faa2fc7e04
                                        • Instruction Fuzzy Hash: 94F06D35A147048BCB15BB78D5045EEB7B9EFC5228F04066ED98A6B200EF70BA82C6D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c7eaa349db4f9926886d587a0de7f2c6c42b57014788a939d83f4428c90ff05
                                        • Instruction ID: 2e9dff1e4709fa3907e7a7cf0569801521ab3b63992abeb2a378f82a8364dda3
                                        • Opcode Fuzzy Hash: 0c7eaa349db4f9926886d587a0de7f2c6c42b57014788a939d83f4428c90ff05
                                        • Instruction Fuzzy Hash: 3CF02472A041255BDB14DF6AE8805BFF7FAFFC0625F10853AD00997340EA70AC0283D4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4af12c39103d9777de318cf89d1bdb4ba80d1b51b81a69ba546803b32b7c451a
                                        • Instruction ID: 75b899f37633fdb37a0aa1650311f3d4e39e48bdfc8b165a6c3ecc8b4911f7fb
                                        • Opcode Fuzzy Hash: 4af12c39103d9777de318cf89d1bdb4ba80d1b51b81a69ba546803b32b7c451a
                                        • Instruction Fuzzy Hash: 1FF082313081119BEB24AB2AC444A7B33EAAFC4A5EB08402DD407C7A90EE61FC41E791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b79351edcabebbba022e3b60e651031a061659d8810fe5a83fbcad68193caa0
                                        • Instruction ID: 8a47edaf53eead896856b62b866dde107c2956007b71ce4e26ed40c2a371c5df
                                        • Opcode Fuzzy Hash: 3b79351edcabebbba022e3b60e651031a061659d8810fe5a83fbcad68193caa0
                                        • Instruction Fuzzy Hash: 42F0F635300610CFC720AB26D48495EB7B7EFC9725344059ED00A87730CB71AC86CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 17b9f6716828c7a6f39a712f41f87691959f9399d32005bbe4a4c2be0ce89c5b
                                        • Instruction ID: 2ee5ee5a7df6bc10ee7c2f5a15eea93935fdf5e9179dc9d78681526a036f9b79
                                        • Opcode Fuzzy Hash: 17b9f6716828c7a6f39a712f41f87691959f9399d32005bbe4a4c2be0ce89c5b
                                        • Instruction Fuzzy Hash: 5AF0E9313003155FC7149F6AD488A5AB7EAEFD5215B0049BCE206C7321CF71EC0687D0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9497953978a2e4b7e4189eefb740286bc01baa4ec1166a775f6c611838f3402f
                                        • Instruction ID: 06a1773912a0e4dbae57bb16bb5ff5902ac616f3a62782e9091993c11adb52aa
                                        • Opcode Fuzzy Hash: 9497953978a2e4b7e4189eefb740286bc01baa4ec1166a775f6c611838f3402f
                                        • Instruction Fuzzy Hash: F9F0F435204650CFC309DB28D499D99BBF1EF8A71831684E9E50ACB372CB72EC46CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f0a0523de7c463a4c3176ed3de39b75a6dc2c1bb898b0d666ee6d6b2ca2c5ec
                                        • Instruction ID: ef56674a54a034ba80894cf5c83c54263ce5e3667e4d9c805caae568d7df1a8b
                                        • Opcode Fuzzy Hash: 6f0a0523de7c463a4c3176ed3de39b75a6dc2c1bb898b0d666ee6d6b2ca2c5ec
                                        • Instruction Fuzzy Hash: F2F054313006148FC724AB1AD48495EB7ABEFC9725754066DE50A87720CF71BC42CBE4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ddeb6949736f2926c50ffefa49f5be1889a0be06795e0512154516b9c12d06ab
                                        • Instruction ID: d7adf792fb527242d3639e736243cb1083ee88a378517e39f4fe4100dfccbbc1
                                        • Opcode Fuzzy Hash: ddeb6949736f2926c50ffefa49f5be1889a0be06795e0512154516b9c12d06ab
                                        • Instruction Fuzzy Hash: E2F055343042544BE304EB38D0527DA3BA2CB8A708F0040AAD0898F3A3CDAAAC074BD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6b886fd58f454b4ba88d2c2b42f4387aa9cd924ef77da2ea4e421fcba2bfe8c9
                                        • Instruction ID: 8f999d1ebd97e6b8558057bafec68dd34e7a44c92430ba7db0679975f10deaca
                                        • Opcode Fuzzy Hash: 6b886fd58f454b4ba88d2c2b42f4387aa9cd924ef77da2ea4e421fcba2bfe8c9
                                        • Instruction Fuzzy Hash: A4E06DA2A1E3800FD3035EACA850088BFB1EA5352034A86CBD181CB293C114A847C772
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 659cf99e0c55b0c6dadfbd623fc3c9ab6a41f40f17ad73e9c166225ba8340660
                                        • Instruction ID: 3145fed54ae75da5b500c3c0a0b900b82d602c4ead18588a75bc97afa5737fc4
                                        • Opcode Fuzzy Hash: 659cf99e0c55b0c6dadfbd623fc3c9ab6a41f40f17ad73e9c166225ba8340660
                                        • Instruction Fuzzy Hash: E0F0EC73904B884AEB019F68E4542D47FF0EB95704F14C54BD4890B167FBF552E6D781
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 62480b0d81a6c0cca11ce355057affad1eec12f664341707230c8bfd51fbadf1
                                        • Instruction ID: c868716707ff75aff86acdf37b7a241d8e45d044d93ed4860cdccb0797ce3b3b
                                        • Opcode Fuzzy Hash: 62480b0d81a6c0cca11ce355057affad1eec12f664341707230c8bfd51fbadf1
                                        • Instruction Fuzzy Hash: 6DF0DF31200610CFC318DB28D588C5977E5EF49B1931688E9E10ACB372CB72EC40CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a573797462a2db4ba70ec099badd94b604573b865bb444ba24e39e78a040c519
                                        • Instruction ID: a368e7e697c625c2b61a8d6972103d83c5696fce01c28286284ea33f6bf20f88
                                        • Opcode Fuzzy Hash: a573797462a2db4ba70ec099badd94b604573b865bb444ba24e39e78a040c519
                                        • Instruction Fuzzy Hash: 4EF0E574509245EFC700EFB4F88245D7FB6EB96300B1180A9D804EF653D6341F0A9B62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d58cb770cec0bac71872629a4cf0399eba778d85a305fc1d616e6497eeefcf0d
                                        • Instruction ID: 81acdd71fa6ef291a8fbe9d6bd2e4e568f2c60d675a6e5de27cd92f429fcd966
                                        • Opcode Fuzzy Hash: d58cb770cec0bac71872629a4cf0399eba778d85a305fc1d616e6497eeefcf0d
                                        • Instruction Fuzzy Hash: 68E04F72B002182F6708DABA8C015EFBAEECBC4154B10847AD50AD3204EE30AD0147D0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 99478badcde7772140191d954b8e42fce16c6baab1fbd0ccd1ace0f0dd04a864
                                        • Instruction ID: b709b01e06d52884f58f280537d5821c55910349ce40b84406edf97d4213e85f
                                        • Opcode Fuzzy Hash: 99478badcde7772140191d954b8e42fce16c6baab1fbd0ccd1ace0f0dd04a864
                                        • Instruction Fuzzy Hash: FAE0D8326086401F9310E62EE88088BAB97EED16143494E6FD185CB262DE60AC0747E5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 11e7bb6ce83ccfae64ef8ad4d6c4093fa2b14fe1b7be734eaf9f4ae8ad68a7bb
                                        • Instruction ID: f0f339e53ff39a2e380e7db03e1a124ae4899a6496cb06d86fa8aa30bc90002b
                                        • Opcode Fuzzy Hash: 11e7bb6ce83ccfae64ef8ad4d6c4093fa2b14fe1b7be734eaf9f4ae8ad68a7bb
                                        • Instruction Fuzzy Hash: 62F01270A44A068BDB14EFB5C4547AE7AB1FF44715F84843DC007EA650DF385885CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7ac8ba111e3f304d65c48dce035ee123db44695b81f471b41b2d20de2d99e058
                                        • Instruction ID: 76c8f2e83ede8e25f4a05091f700d51576a2bc50ef06eaa3954c10c1e7f55529
                                        • Opcode Fuzzy Hash: 7ac8ba111e3f304d65c48dce035ee123db44695b81f471b41b2d20de2d99e058
                                        • Instruction Fuzzy Hash: FEE06D31A002199FCB10EB6DD8086DEB7F4EB88325F004529D90AD3340E774AA1ACFD0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d59c9f250cc56456a2f332390ef12b8910542c7cd88ecedf64e8fe6f1b0a9a63
                                        • Instruction ID: a1bb197753e7df1d8a324eaab63b851ca8cfcf635c87fbed330ed74d3616fab5
                                        • Opcode Fuzzy Hash: d59c9f250cc56456a2f332390ef12b8910542c7cd88ecedf64e8fe6f1b0a9a63
                                        • Instruction Fuzzy Hash: 9CE09B719057459FEB01AB74C4500AC7BB0EE92250B11C2CBD4864A166F7305687D751
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e635b0b05cb6b5d2ef88ff12d38a6f0d8e70a8ea670556d64b0fa0466ec4a0c0
                                        • Instruction ID: e629d7cc3bfd7e0db66eb2b60f2be8ca77b142468451dc4d183a1ad57d6f649d
                                        • Opcode Fuzzy Hash: e635b0b05cb6b5d2ef88ff12d38a6f0d8e70a8ea670556d64b0fa0466ec4a0c0
                                        • Instruction Fuzzy Hash: 91E04F79A5122DDFDB189F81E504BFDBBB0FB8531AF204422D113B1550DB712980CAA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c3c7f34225501014e39edb4dc55eaf20c2c34c7b8b10d354edc5e81529f2ba71
                                        • Instruction ID: 3aa3fb8beaf3dda173b0353ea269556a82d9235a4505af1b5976ae03c52b90b6
                                        • Opcode Fuzzy Hash: c3c7f34225501014e39edb4dc55eaf20c2c34c7b8b10d354edc5e81529f2ba71
                                        • Instruction Fuzzy Hash: E6E086307106248BF708AB79D415BDB36DA9B89B55F0044ADE14E8F3A1CEF6AC414BD5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d48921fc971eddb7b354fdf56bb68293119cb92d0d21aecb563f041f75fa8c8
                                        • Instruction ID: b4bae813ca308af4408b3afd3110ffbb01c3044b705dbafb8ad34dbb9d666063
                                        • Opcode Fuzzy Hash: 3d48921fc971eddb7b354fdf56bb68293119cb92d0d21aecb563f041f75fa8c8
                                        • Instruction Fuzzy Hash: 5BF0C936A0110ECFCB54EFA4D6446DCB7B1EB8C315F2000A9D406B7210DB326E41CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c34ab101c5af3d8093e547d54d062a207a583040071c744dff614bfa16f50872
                                        • Instruction ID: 94ff01de18147bcaea45dd77cf4a5568fb3ed68ad211d6d6564af7ae81cb1fc6
                                        • Opcode Fuzzy Hash: c34ab101c5af3d8093e547d54d062a207a583040071c744dff614bfa16f50872
                                        • Instruction Fuzzy Hash: 01E0488050EAD44FDB1397B9A9653953FB05763305F850495D4D4872E7C45C4579C722
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0012da431735bee9457c08cca5627d6d574dcc0d624b0fde019a16bce7b1bec
                                        • Instruction ID: 613a6221b81c3412e6c21008f8b531f69890af7117e19971293959609f746cc8
                                        • Opcode Fuzzy Hash: a0012da431735bee9457c08cca5627d6d574dcc0d624b0fde019a16bce7b1bec
                                        • Instruction Fuzzy Hash: EEE08674A00208EF8B00EFB5E94185DB7B9EB5531475144A8D804EF705DB351F00DB56
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 02597d354a639fc4b039949c57bad6ceca1ab1a56e36c793124eed97deb0af0c
                                        • Instruction ID: 547cece39f5c878533724662411089f875333dc65dced1a3100333968f7b0edd
                                        • Opcode Fuzzy Hash: 02597d354a639fc4b039949c57bad6ceca1ab1a56e36c793124eed97deb0af0c
                                        • Instruction Fuzzy Hash: 98D0A7113051A123D245923E740DBA9E985DBCA325F5801EEE240D3289CD744C4243D5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a5c1164a807af0f061c602390aca7fa673432ccb04b6ad042e3b5206f3398302
                                        • Instruction ID: d545c1b1ec98b30076d0bead15bf7b1849c40fe058544e9090b9b9ee62e25bb5
                                        • Opcode Fuzzy Hash: a5c1164a807af0f061c602390aca7fa673432ccb04b6ad042e3b5206f3398302
                                        • Instruction Fuzzy Hash: 19D013B44096818FF715DE15B5011C47FF2DFA5548B55D4D9C5C04751ED535544BD700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca07cb4a8244fd213871353ebc7b53b30858cfcd75859d38c893190ffbf32c76
                                        • Instruction ID: 3e062856b7c3067b038b91452513d5d58afcbb51ae96a547508270291a62ba6b
                                        • Opcode Fuzzy Hash: ca07cb4a8244fd213871353ebc7b53b30858cfcd75859d38c893190ffbf32c76
                                        • Instruction Fuzzy Hash: 77D05E3850EBC28FCB02DF65D9A6485BFB1AA9660074946EED4854E163DA246C0BCF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9edf42b2b23fbd48f52f461fed9b3a1449b26356eeda69788b42d103c5c1bbea
                                        • Instruction ID: 3a54fec1857c9bd3eb15b2570aaeff89d6814eadf9b542b1ca8004063239945d
                                        • Opcode Fuzzy Hash: 9edf42b2b23fbd48f52f461fed9b3a1449b26356eeda69788b42d103c5c1bbea
                                        • Instruction Fuzzy Hash: BCD0223031020A83DB447BA4A41877533BCAF80204F88002DF41FC2510EB1AF881D610
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d0a9eb075811bf1517a6f15111f9d0221ec3e02a3ee653c528a91bc1c848c810
                                        • Instruction ID: a6a2be792dbe9609dbfa88e9b360bda89d085b8731304f1a99245d786736a2ab
                                        • Opcode Fuzzy Hash: d0a9eb075811bf1517a6f15111f9d0221ec3e02a3ee653c528a91bc1c848c810
                                        • Instruction Fuzzy Hash: BED0A7A155E7848DE70137602B142C13B34EC932A474E00EFD05985963D5185205D723
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9a836c35046e29ea013938a9a228356dce3408e212d7098118a3edf7ceb2b4a
                                        • Instruction ID: a9ef9c9b5d101559492c97c1751004bc252b6ee0ac5d83994dbffeb2b26249ea
                                        • Opcode Fuzzy Hash: b9a836c35046e29ea013938a9a228356dce3408e212d7098118a3edf7ceb2b4a
                                        • Instruction Fuzzy Hash: 23C080544083C56FF71137B5D50D3557F9CDF4225EF5540C1E905D1183DA14B457C751
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f17ff545c7f00002d9cdd85294d1fa9687e1976b410a3d04434220a0299cc9fc
                                        • Instruction ID: 110323b48eb1e5ee60aa92521c53f8d4083227d75c72bb890d6b8895e173934b
                                        • Opcode Fuzzy Hash: f17ff545c7f00002d9cdd85294d1fa9687e1976b410a3d04434220a0299cc9fc
                                        • Instruction Fuzzy Hash: 5AB09B2171413413D50A319DA4105EE728D4795568F400077D50EA7B418DD55D4103DA
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e7cbebbcee3ba519ee90a82df333a1db8a92108f82ba1d622691e6d2dad66166
                                        • Instruction ID: b529df20e86e360ececeb53cf4dd07ea9c4f673fda5dd64e21984474e34adc50
                                        • Opcode Fuzzy Hash: e7cbebbcee3ba519ee90a82df333a1db8a92108f82ba1d622691e6d2dad66166
                                        • Instruction Fuzzy Hash: 62B092315586485E6E403BF17A0816A33CC9B4016A7840061B80EC0540EA29F8208061
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ea549631d59f06e1cbc7873aee82570531c71c2924e057a60212b238144f956
                                        • Instruction ID: b256a522c04c66430a2958f4e8b773c5ad8c6119e01bcff0882dcf994a3e9acf
                                        • Opcode Fuzzy Hash: 8ea549631d59f06e1cbc7873aee82570531c71c2924e057a60212b238144f956
                                        • Instruction Fuzzy Hash: 7BC0023B000108EFCB025F80EC08C85BFBAEB48310705C091F6098B072DB76D564EB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.362971464.0000000004AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4ad0000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 902100aaf0824ff0d5ae2a6b63183994ebc2712604bc74ff8fbe0efede7858e1
                                        • Instruction ID: 80fe4e801b8ccf41ccaad0fc1c8275ef72595398921f84678d7162df9b54ddfb
                                        • Opcode Fuzzy Hash: 902100aaf0824ff0d5ae2a6b63183994ebc2712604bc74ff8fbe0efede7858e1
                                        • Instruction Fuzzy Hash: 31B0127033440083F6406B7041887173010FF9023CFC44CA8910B8D116CB3AA5054FB2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c3e4d5a391ae12f26aeb6beb9e7be2e36cc55fda9fde41a15073fc125bfa7756
                                        • Instruction ID: b4243ffe101549b1ac6f479a2118df93fb1aa89a76fe4da379702cc8531df1b4
                                        • Opcode Fuzzy Hash: c3e4d5a391ae12f26aeb6beb9e7be2e36cc55fda9fde41a15073fc125bfa7756
                                        • Instruction Fuzzy Hash: 0B1293F1411F468AD330CFA5ED985893BA1B745328F944308D2A56BAF1DBFC116ACF94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f1893df4b107beb2a59924d4e1de97b409aecbecce8a6bbf8f6b5ab3e7e8fea1
                                        • Instruction ID: 45732551eba7385184f710cad0c6f1f9baad3abd5725724684eecc5c52e56535
                                        • Opcode Fuzzy Hash: f1893df4b107beb2a59924d4e1de97b409aecbecce8a6bbf8f6b5ab3e7e8fea1
                                        • Instruction Fuzzy Hash: 1CA17E32E10219CFCF15EFB5C8845AEBBB2FF85300B15816BE905AB261EB75A945CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.346487921.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2480000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a605d16390374d33300d6fb9f083b9e4877e15feef39422f67bd24eb28bca8f5
                                        • Instruction ID: 0f5edd51b6a6e568541b2eaa03017a4e0b1ab24e677c6792c85e75363a2977a7
                                        • Opcode Fuzzy Hash: a605d16390374d33300d6fb9f083b9e4877e15feef39422f67bd24eb28bca8f5
                                        • Instruction Fuzzy Hash: F3C109B1411F46CAD720CFA5EC885893BA1BB85328F544318D2A16BAF0DFFC116ACF94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:13.7%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:932
                                        Total number of Limit Nodes:79
                                        execution_graph 39958 4f5a0f8 39959 4f5a109 39958->39959 39962 4f5a173 39959->39962 39963 4f59788 39959->39963 39962->39962 39964 4f59793 39963->39964 39965 4f5a16c 39964->39965 39968 4f5b896 39964->39968 39975 4f5b898 39964->39975 39969 4f5b898 39968->39969 39981 4f5a504 39969->39981 39972 4f5b8d7 CreateIconFromResourceEx 39974 4f5b966 39972->39974 39973 4f5b8bf 39973->39965 39974->39965 39976 4f5a504 CreateIconFromResourceEx 39975->39976 39977 4f5b8b2 39976->39977 39978 4f5b8bf 39977->39978 39979 4f5b8d7 CreateIconFromResourceEx 39977->39979 39978->39965 39980 4f5b966 39979->39980 39980->39965 39982 4f5b8e8 CreateIconFromResourceEx 39981->39982 39983 4f5b8b2 39982->39983 39983->39972 39983->39973 40480 4f5c4d8 40486 4f52750 40480->40486 40482 4f5c4e8 40491 4e0fe02 40482->40491 40500 4e0fe10 40482->40500 40483 4f5c4fa 40487 4f52760 40486->40487 40488 4f5279d 40487->40488 40509 4f55d39 40487->40509 40537 4f55d48 40487->40537 40488->40482 40492 4e0fe10 40491->40492 40493 4e0fe25 40492->40493 40695 4e0da3c 40492->40695 40497 4e0fe10 2 API calls 40493->40497 40498 4e0fe02 2 API calls 40493->40498 40499 4e0da3c SetWindowLongW 40493->40499 40495 4e0fe28 SetWindowLongW 40495->40483 40496 4e0feac 40495->40496 40496->40483 40497->40495 40498->40495 40499->40495 40501 4e0fe14 40500->40501 40502 4e0fe25 40501->40502 40503 4e0da3c SetWindowLongW 40501->40503 40506 4e0fe10 2 API calls 40502->40506 40507 4e0fe02 2 API calls 40502->40507 40508 4e0da3c SetWindowLongW 40502->40508 40503->40502 40504 4e0fe28 SetWindowLongW 40504->40483 40505 4e0feac 40504->40505 40505->40483 40506->40504 40507->40504 40508->40504 40510 4f55d81 40509->40510 40517 4f55e1f 40510->40517 40565 4e0e0f0 40510->40565 40574 4e0e0d8 40510->40574 40514 4f55e95 40603 4f55604 40514->40603 40583 4f555f4 40517->40583 40519 4f55ec4 40520 4f52750 10 API calls 40519->40520 40521 4f55fb4 40519->40521 40522 4f55f4c 40520->40522 40629 4f5cd49 40521->40629 40633 4f5cd58 40521->40633 40614 4f55654 40522->40614 40524 4f5601b 40524->40524 40525 4f55f5b 40525->40521 40526 4f55654 3 API calls 40525->40526 40527 4f55f86 40526->40527 40527->40521 40528 4f55654 3 API calls 40527->40528 40529 4f55f97 40528->40529 40619 4f55674 40529->40619 40531 4f55fa6 40626 4f51540 40531->40626 40538 4f55d81 40537->40538 40545 4f55e1f 40538->40545 40561 4e0e0f0 5 API calls 40538->40561 40562 4e0e0d8 5 API calls 40538->40562 40539 4f555f4 10 API calls 40540 4f55e8b 40539->40540 40541 4f55120 10 API calls 40540->40541 40542 4f55e95 40541->40542 40543 4f55604 10 API calls 40542->40543 40544 4f55e9d 40543->40544 40546 4f55614 10 API calls 40544->40546 40547 4f55ec4 40544->40547 40545->40539 40546->40547 40548 4f55fb4 40547->40548 40549 4f52750 10 API calls 40547->40549 40563 4f5cd49 10 API calls 40548->40563 40564 4f5cd58 10 API calls 40548->40564 40550 4f55f4c 40549->40550 40551 4f55654 3 API calls 40550->40551 40553 4f55f5b 40551->40553 40552 4f5601b 40553->40548 40554 4f55654 3 API calls 40553->40554 40555 4f55f86 40554->40555 40555->40548 40556 4f55654 3 API calls 40555->40556 40557 4f55f97 40556->40557 40558 4f55674 10 API calls 40557->40558 40559 4f55fa6 40558->40559 40560 4f51540 SendMessageW 40559->40560 40560->40548 40561->40545 40562->40545 40563->40552 40564->40552 40567 4e0e121 40565->40567 40568 4e0e213 40565->40568 40566 4e0e12d 40566->40517 40567->40566 40569 4e0e16e 40567->40569 40637 4e0e428 40567->40637 40640 4e0e438 40567->40640 40568->40517 40643 4e0ee00 40569->40643 40648 4e0edef 40569->40648 40576 4e0e121 40574->40576 40577 4e0e213 40574->40577 40575 4e0e12d 40575->40517 40576->40575 40578 4e0e16e 40576->40578 40581 4e0e428 2 API calls 40576->40581 40582 4e0e438 2 API calls 40576->40582 40577->40517 40579 4e0ee00 3 API calls 40578->40579 40580 4e0edef 3 API calls 40578->40580 40579->40577 40580->40577 40581->40578 40582->40578 40586 4f555ff 40583->40586 40584 4f55e8b 40589 4f55120 40584->40589 40585 4f59cd8 40588 4f52750 10 API calls 40585->40588 40586->40584 40586->40585 40587 4f55654 3 API calls 40586->40587 40587->40585 40588->40584 40591 4f5512b 40589->40591 40590 4f59f98 40590->40514 40591->40590 40597 4f59f64 40591->40597 40602 4f59f11 40591->40602 40681 4f59704 10 API calls 40591->40681 40592 4f59f4a 40594 4f55674 10 API calls 40592->40594 40593 4f55674 10 API calls 40595 4f59f3c 40593->40595 40596 4f59f56 40594->40596 40675 4f59714 40595->40675 40599 4f59714 10 API calls 40596->40599 40597->40590 40600 4f52750 10 API calls 40597->40600 40599->40597 40600->40590 40602->40592 40602->40593 40604 4f5560f 40603->40604 40605 4f55e9d 40604->40605 40606 4f52750 10 API calls 40604->40606 40605->40519 40609 4f55614 40605->40609 40607 4f5bd1c 40606->40607 40685 4f5a570 40607->40685 40610 4f5561f 40609->40610 40611 4f5c096 40610->40611 40612 4f52750 10 API calls 40610->40612 40611->40519 40613 4f5c166 40612->40613 40613->40519 40616 4f5565f 40614->40616 40615 4f59d9b 40615->40525 40616->40615 40617 4e0ee00 3 API calls 40616->40617 40618 4e0edef 3 API calls 40616->40618 40617->40615 40618->40615 40621 4f5567f 40619->40621 40620 4f5bbde 40620->40531 40621->40620 40622 4f52750 10 API calls 40621->40622 40623 4f5bc38 40622->40623 40624 4f5a548 SendMessageW 40623->40624 40625 4f5bc49 40624->40625 40625->40531 40627 4f5c3d8 SendMessageW 40626->40627 40628 4f5c444 40627->40628 40628->40521 40630 4f5cd58 40629->40630 40631 4f55604 10 API calls 40630->40631 40632 4f5cd6c 40631->40632 40632->40524 40634 4f5cd5c 40633->40634 40635 4f55604 10 API calls 40634->40635 40636 4f5cd6c 40635->40636 40636->40524 40638 4e093e8 2 API calls 40637->40638 40639 4e0e441 40638->40639 40639->40569 40641 4e093e8 2 API calls 40640->40641 40642 4e0e441 40640->40642 40641->40642 40642->40569 40644 4e0ee2a 40643->40644 40645 4e0eed1 40644->40645 40653 4e0faa0 40644->40653 40663 4e0fba8 40644->40663 40649 4e0ee2a 40648->40649 40650 4e0eed1 40649->40650 40651 4e0faa0 2 API calls 40649->40651 40652 4e0fba8 2 API calls 40649->40652 40651->40650 40652->40650 40654 4e0fab0 40653->40654 40655 4e0fab4 40653->40655 40654->40645 40656 4e0fbd8 40655->40656 40657 4e0fad0 40655->40657 40660 4e0fbe0 CreateWindowExW 40655->40660 40671 4e0da04 40656->40671 40657->40645 40662 4e0fd1c 40660->40662 40664 4e0fbac 40663->40664 40665 4e0fbe0 CreateWindowExW 40664->40665 40666 4e0fbd8 40664->40666 40670 4e0fd1c 40665->40670 40667 4e0da04 CreateWindowExW 40666->40667 40668 4e0fbdd 40667->40668 40668->40645 40672 4e0fbf8 CreateWindowExW 40671->40672 40674 4e0fd1c 40672->40674 40676 4f5971f 40675->40676 40677 4f5bc38 40676->40677 40678 4f52750 10 API calls 40676->40678 40682 4f5a548 40677->40682 40678->40677 40681->40602 40683 4f5bc60 SendMessageW 40682->40683 40684 4f5bc49 40683->40684 40684->40592 40686 4f5a57b 40685->40686 40689 4f55830 40686->40689 40688 4f5be04 40688->40605 40691 4f5583b 40689->40691 40690 4f58fcc 40690->40688 40691->40690 40692 4f52750 10 API calls 40691->40692 40694 4f58dec 40692->40694 40693 4f55604 10 API calls 40693->40690 40694->40690 40694->40693 40696 4e0fe40 SetWindowLongW 40695->40696 40697 4e0feac 40696->40697 40697->40493 40698 4f525d8 40699 4f525e8 40698->40699 40703 4f58898 40699->40703 40709 4f58888 40699->40709 40700 4f52611 40704 4f5889c 40703->40704 40715 4f53660 40704->40715 40708 4f58929 40708->40700 40710 4f58898 40709->40710 40711 4f53660 11 API calls 40710->40711 40712 4f58922 40711->40712 40713 4f57240 10 API calls 40712->40713 40714 4f58929 40713->40714 40714->40700 40718 4f5368c 40715->40718 40716 4f538bc 40719 4f52750 10 API calls 40716->40719 40723 4f53a87 40716->40723 40718->40716 40739 4f53238 40718->40739 40721 4f53a64 40719->40721 40720 4f5373d 40724 4f52750 10 API calls 40720->40724 40728 4f537e5 40720->40728 40745 4f532d8 40721->40745 40729 4f57240 40723->40729 40725 4f537af 40724->40725 40726 4f52750 10 API calls 40725->40726 40726->40728 40727 4f52750 10 API calls 40727->40716 40728->40727 40730 4f5724b 40729->40730 40731 4f58ac5 40730->40731 40732 4f58a8d 40730->40732 40738 4f58a94 40730->40738 40734 4f58b16 40731->40734 40735 4f58aea 40731->40735 40733 4f52750 10 API calls 40732->40733 40733->40738 40737 4f52750 10 API calls 40734->40737 40736 4f52750 10 API calls 40735->40736 40736->40738 40737->40738 40738->40708 40741 4f53243 40739->40741 40740 4f52750 10 API calls 40744 4f53bb9 40740->40744 40742 4f52750 10 API calls 40741->40742 40743 4f53bf7 40741->40743 40741->40744 40742->40744 40743->40720 40744->40740 40744->40743 40746 4f5e6e0 PostMessageW 40745->40746 40747 4f5e74c 40746->40747 40747->40723 40748 f2d01c 40749 f2d034 40748->40749 40750 f2d08e 40749->40750 40754 4f50be8 40749->40754 40761 4f59e00 40749->40761 40776 4f50bda 40749->40776 40755 4f50c15 40754->40755 40756 4f50c47 40755->40756 40783 65716e7 40755->40783 40788 65716f8 40755->40788 40793 4f50d60 40755->40793 40798 4f50d70 40755->40798 40762 4f59e10 40761->40762 40765 4f59e14 40761->40765 40762->40750 40763 4f59f98 40763->40750 40764 4f59f11 40766 4f59f4a 40764->40766 40767 4f55674 10 API calls 40764->40767 40765->40750 40765->40763 40765->40764 40771 4f59f64 40765->40771 40915 4f59704 10 API calls 40765->40915 40768 4f55674 10 API calls 40766->40768 40769 4f59f3c 40767->40769 40770 4f59f56 40768->40770 40772 4f59714 10 API calls 40769->40772 40773 4f59714 10 API calls 40770->40773 40771->40763 40774 4f52750 10 API calls 40771->40774 40772->40766 40773->40771 40774->40763 40777 4f50c15 40776->40777 40778 4f50c47 40777->40778 40779 65716e7 2 API calls 40777->40779 40780 4f50d70 12 API calls 40777->40780 40781 4f50d60 12 API calls 40777->40781 40782 65716f8 2 API calls 40777->40782 40779->40778 40780->40778 40781->40778 40782->40778 40784 65716f8 40783->40784 40802 4f52470 40784->40802 40806 4f52440 40784->40806 40785 6571790 40785->40756 40789 657170d 40788->40789 40791 4f52470 CallWindowProcW 40789->40791 40792 4f52440 CallWindowProcW 40789->40792 40790 6571790 40790->40756 40791->40790 40792->40790 40794 4f50d4f 40793->40794 40796 4f50d6b 40793->40796 40794->40756 40795 4f50e10 40795->40756 40810 4f50e28 40796->40810 40800 4f50d84 40798->40800 40799 4f50e10 40799->40756 40801 4f50e28 12 API calls 40800->40801 40801->40799 40803 4f524b2 40802->40803 40805 4f524b9 40802->40805 40804 4f5250a CallWindowProcW 40803->40804 40803->40805 40804->40805 40805->40785 40807 4f524b2 40806->40807 40809 4f524b9 40806->40809 40808 4f5250a CallWindowProcW 40807->40808 40807->40809 40808->40809 40809->40785 40811 4f50e39 40810->40811 40814 4f562f8 40810->40814 40835 4f562e8 40810->40835 40811->40795 40815 4f562fc 40814->40815 40816 4f56316 40815->40816 40817 4f56358 40815->40817 40823 4f5632d 40815->40823 40818 4f56332 40816->40818 40819 4f5631b 40816->40819 40820 4f565e4 40817->40820 40817->40823 40818->40823 40827 4f56550 40818->40827 40828 4f565ac 40818->40828 40832 4f5645e 40818->40832 40821 4f56324 40819->40821 40822 4f56542 40819->40822 40864 4f558d0 40820->40864 40821->40823 40824 4f565ba 40821->40824 40856 4f55820 40822->40856 40823->40832 40870 4f56a8a 40823->40870 40875 4f56a88 40823->40875 40880 4f558a0 SendMessageW CallWindowProcW CallWindowProcW 40824->40880 40830 4f55830 10 API calls 40827->40830 40860 4f55890 40828->40860 40830->40832 40832->40811 40836 4f562f8 40835->40836 40837 4f56316 40836->40837 40838 4f56358 40836->40838 40844 4f5632d 40836->40844 40839 4f56332 40837->40839 40840 4f5631b 40837->40840 40841 4f565e4 40838->40841 40838->40844 40839->40844 40848 4f56550 40839->40848 40849 4f565ac 40839->40849 40853 4f5645e 40839->40853 40842 4f56324 40840->40842 40843 4f56542 40840->40843 40847 4f558d0 12 API calls 40841->40847 40842->40844 40845 4f565ba 40842->40845 40846 4f55820 3 API calls 40843->40846 40844->40853 40854 4f56a88 3 API calls 40844->40854 40855 4f56a8a 3 API calls 40844->40855 40914 4f558a0 SendMessageW CallWindowProcW CallWindowProcW 40845->40914 40846->40853 40847->40853 40851 4f55830 10 API calls 40848->40851 40852 4f55890 3 API calls 40849->40852 40851->40853 40852->40853 40853->40811 40854->40853 40855->40853 40857 4f5582b 40856->40857 40858 4f56a88 3 API calls 40857->40858 40859 4f56c9e 40858->40859 40859->40832 40861 4f5589b 40860->40861 40862 4f56a88 3 API calls 40861->40862 40863 4f5d30c 40862->40863 40863->40832 40865 4f558db 40864->40865 40866 4f55830 10 API calls 40865->40866 40867 4f58d68 40866->40867 40868 4f56a88 3 API calls 40867->40868 40869 4f58d71 40868->40869 40869->40832 40871 4f56a93 40870->40871 40872 4f56a9a 40870->40872 40871->40832 40881 4f56aaa 40872->40881 40873 4f56aa0 40873->40832 40876 4f56a93 40875->40876 40877 4f56a9a 40875->40877 40876->40832 40879 4f56aaa 3 API calls 40877->40879 40878 4f56aa0 40878->40832 40879->40878 40880->40832 40882 4f56ae8 40881->40882 40884 4f56ac6 40881->40884 40883 4f517e0 3 API calls 40882->40883 40887 4f56aef 40883->40887 40885 4f56ad4 40884->40885 40889 4f517e0 40884->40889 40885->40873 40887->40873 40888 4f56b10 40888->40873 40890 4f5182c 40889->40890 40891 4f51c6b 40890->40891 40893 4f51a99 40890->40893 40894 4f51870 40890->40894 40899 4f511c8 40891->40899 40893->40888 40894->40893 40895 4f521e6 40894->40895 40896 4f51540 SendMessageW 40894->40896 40895->40893 40904 4f56b28 40895->40904 40909 4f56b18 40895->40909 40896->40894 40900 4f511d3 40899->40900 40902 4f56b28 2 API calls 40900->40902 40903 4f56b18 2 API calls 40900->40903 40901 4f58d3c 40901->40893 40902->40901 40903->40901 40905 4f56b6e 40904->40905 40906 4f56b91 40905->40906 40907 4f52470 CallWindowProcW 40905->40907 40908 4f52440 CallWindowProcW 40905->40908 40906->40893 40907->40906 40908->40906 40910 4f56b6e 40909->40910 40911 4f56b91 40910->40911 40912 4f52470 CallWindowProcW 40910->40912 40913 4f52440 CallWindowProcW 40910->40913 40911->40893 40912->40911 40913->40911 40914->40853 40915->40764 39984 6574098 39985 65740a1 39984->39985 39989 6578b59 39985->39989 39994 6578b68 39985->39994 39986 65740c6 39990 6578b68 39989->39990 39991 6578b7e 39990->39991 39999 65741f8 39990->39999 40011 65741e8 39990->40011 39991->39986 39995 6578b7a 39994->39995 39996 6578b7e 39995->39996 39997 65741f8 11 API calls 39995->39997 39998 65741e8 11 API calls 39995->39998 39996->39986 39997->39996 39998->39996 40000 65741fc 39999->40000 40001 657430e 40000->40001 40002 657421c 40000->40002 40034 6578fab 40001->40034 40042 6578c9f 40001->40042 40051 6578f9f 40001->40051 40059 6578cb0 40001->40059 40068 6578e18 40001->40068 40024 657439a 40002->40024 40029 65743a8 40002->40029 40003 65742d4 40003->39991 40012 65741f6 40011->40012 40015 65741b3 40011->40015 40013 657430e 40012->40013 40016 657421c 40012->40016 40017 6578cb0 11 API calls 40013->40017 40018 6578f9f 11 API calls 40013->40018 40019 6578c9f 11 API calls 40013->40019 40020 6578fab 11 API calls 40013->40020 40021 6578e18 11 API calls 40013->40021 40014 65742d4 40014->39991 40015->39991 40022 657439a 11 API calls 40016->40022 40023 65743a8 11 API calls 40016->40023 40017->40014 40018->40014 40019->40014 40020->40014 40021->40014 40022->40014 40023->40014 40025 65743dc 40024->40025 40076 6574e30 40025->40076 40082 6574e0c 40025->40082 40026 657448a 40026->40003 40030 65743dc 40029->40030 40032 6574e30 11 API calls 40030->40032 40033 6574e0c 11 API calls 40030->40033 40031 657448a 40031->40003 40032->40031 40033->40031 40035 6578ec4 40034->40035 40037 6578ed4 40034->40037 40035->40037 40222 65791b5 40035->40222 40227 6579118 40035->40227 40232 6579109 40035->40232 40036 6578b68 11 API calls 40036->40037 40037->40036 40038 6578fd5 40037->40038 40038->40003 40044 6578cb0 40042->40044 40043 6578ed4 40045 6578b68 11 API calls 40043->40045 40046 6578fd5 40043->40046 40044->40043 40047 6578ce1 40044->40047 40048 65791b5 11 API calls 40044->40048 40049 6579109 11 API calls 40044->40049 40050 6579118 11 API calls 40044->40050 40045->40043 40046->40003 40047->40003 40048->40043 40049->40043 40050->40043 40052 6578ec4 40051->40052 40053 6578ed4 40052->40053 40056 65791b5 11 API calls 40052->40056 40057 6579109 11 API calls 40052->40057 40058 6579118 11 API calls 40052->40058 40054 6578b68 11 API calls 40053->40054 40055 6578fd5 40053->40055 40054->40053 40055->40003 40056->40053 40057->40053 40058->40053 40060 6578cc7 40059->40060 40061 6578ce1 40060->40061 40062 6578ed4 40060->40062 40065 65791b5 11 API calls 40060->40065 40066 6579109 11 API calls 40060->40066 40067 6579118 11 API calls 40060->40067 40061->40003 40063 6578b68 11 API calls 40062->40063 40064 6578fd5 40062->40064 40063->40062 40064->40003 40065->40062 40066->40062 40067->40062 40069 6578e3b 40068->40069 40071 6578ed4 40069->40071 40073 65791b5 11 API calls 40069->40073 40074 6579109 11 API calls 40069->40074 40075 6579118 11 API calls 40069->40075 40070 6578fd5 40070->40003 40071->40070 40072 6578b68 11 API calls 40071->40072 40072->40071 40073->40071 40074->40071 40075->40071 40077 6574e51 40076->40077 40078 6574e5a 40077->40078 40088 6574f40 40077->40088 40092 6575097 40077->40092 40096 6574f2f 40077->40096 40078->40026 40083 6574e12 40082->40083 40084 6574e5a 40082->40084 40083->40084 40085 6575097 11 API calls 40083->40085 40086 6574f40 11 API calls 40083->40086 40087 6574f2f 11 API calls 40083->40087 40084->40026 40085->40084 40086->40084 40087->40084 40091 6574f6a 40088->40091 40089 657508f 40089->40078 40091->40089 40100 6573e18 40091->40100 40094 6574fd1 40092->40094 40093 657508f 40093->40078 40094->40093 40095 6573e18 11 API calls 40094->40095 40095->40093 40099 6574f33 40096->40099 40097 657508f 40097->40078 40098 6573e18 11 API calls 40098->40097 40099->40097 40099->40098 40101 6573e46 40100->40101 40104 6573e85 40100->40104 40102 6573e77 40101->40102 40103 6573e8a 40101->40103 40101->40104 40109 65740f8 40102->40109 40117 6574108 40102->40117 40103->40104 40125 6575100 40103->40125 40134 65750ef 40103->40134 40104->40089 40110 6574108 40109->40110 40111 65741a0 40110->40111 40112 65741aa 40110->40112 40113 65741f8 11 API calls 40110->40113 40114 65741e8 11 API calls 40110->40114 40143 65750b8 40111->40143 40147 65750a8 40111->40147 40112->40104 40113->40111 40114->40111 40119 6574130 40117->40119 40118 65741aa 40118->40104 40119->40118 40120 65741a0 40119->40120 40121 65741f8 11 API calls 40119->40121 40122 65741e8 11 API calls 40119->40122 40123 65750b8 11 API calls 40120->40123 40124 65750a8 11 API calls 40120->40124 40121->40120 40122->40120 40123->40118 40124->40118 40126 657511d 40125->40126 40129 657518e 40125->40129 40127 65751dc 40126->40127 40128 657512e 40126->40128 40127->40129 40132 6575100 11 API calls 40127->40132 40133 65750ef 11 API calls 40127->40133 40128->40129 40151 6575342 40128->40151 40156 6575350 40128->40156 40129->40104 40132->40129 40133->40129 40135 65750f3 40134->40135 40136 657512e 40135->40136 40137 65751dc 40135->40137 40138 657518e 40135->40138 40136->40138 40139 6575342 11 API calls 40136->40139 40140 6575350 11 API calls 40136->40140 40137->40138 40141 6575100 11 API calls 40137->40141 40142 65750ef 11 API calls 40137->40142 40138->40104 40139->40138 40140->40138 40141->40138 40142->40138 40145 65750c5 40143->40145 40144 65750e8 40144->40112 40145->40144 40146 6573e18 11 API calls 40145->40146 40146->40144 40148 65750ab 40147->40148 40149 6573e18 11 API calls 40148->40149 40150 65750e8 40148->40150 40149->40150 40150->40112 40152 657534b 40151->40152 40153 6575390 40152->40153 40161 6575410 40152->40161 40172 6575400 40152->40172 40153->40129 40158 6575370 40156->40158 40157 6575390 40157->40129 40158->40157 40159 6575410 11 API calls 40158->40159 40160 6575400 11 API calls 40158->40160 40159->40157 40160->40157 40162 657541c 40161->40162 40164 657542c 40161->40164 40163 6575423 40162->40163 40162->40164 40165 6575439 40162->40165 40166 6575400 11 API calls 40163->40166 40188 6575478 40163->40188 40194 6575468 40163->40194 40164->40153 40200 6575632 40165->40200 40204 6575640 40165->40204 40208 6575a58 40165->40208 40166->40164 40173 657540a 40172->40173 40177 657547f 40172->40177 40174 6575423 40173->40174 40175 657542c 40173->40175 40176 6575439 40173->40176 40182 6575400 11 API calls 40174->40182 40183 6575478 11 API calls 40174->40183 40184 6575468 11 API calls 40174->40184 40175->40153 40185 6575632 11 API calls 40176->40185 40186 6575640 11 API calls 40176->40186 40187 6575a58 11 API calls 40176->40187 40178 65754fd 40177->40178 40212 6575578 40177->40212 40216 6575518 40177->40216 40179 65754fa 40179->40153 40182->40175 40183->40175 40184->40175 40185->40175 40186->40175 40187->40175 40190 6575480 40188->40190 40189 65754fd 40190->40189 40192 6575578 11 API calls 40190->40192 40193 6575518 11 API calls 40190->40193 40191 65754fa 40191->40164 40192->40191 40193->40191 40196 6575480 40194->40196 40195 65754fd 40196->40195 40198 6575578 11 API calls 40196->40198 40199 6575518 11 API calls 40196->40199 40197 65754fa 40197->40164 40198->40197 40199->40197 40201 657566c 40200->40201 40202 65758d1 40201->40202 40203 6575518 11 API calls 40201->40203 40202->40164 40203->40201 40205 657566c 40204->40205 40206 65758d1 40205->40206 40207 6575518 11 API calls 40205->40207 40206->40164 40207->40205 40210 6575a64 40208->40210 40209 6575a6d 40209->40164 40210->40209 40211 6574e30 11 API calls 40210->40211 40211->40209 40213 657557b 40212->40213 40214 6574e30 11 API calls 40213->40214 40215 657561b 40214->40215 40215->40179 40217 657552a 40216->40217 40219 6575531 40216->40219 40217->40179 40218 6575553 40218->40179 40219->40218 40220 6574e30 11 API calls 40219->40220 40221 657561b 40220->40221 40221->40179 40223 6579192 40222->40223 40224 65791fa 40223->40224 40237 6579571 40223->40237 40243 6579578 40223->40243 40224->40037 40228 65791fa 40227->40228 40229 6579142 40227->40229 40228->40037 40229->40228 40230 6579571 11 API calls 40229->40230 40231 6579578 11 API calls 40229->40231 40230->40229 40231->40229 40234 657910c 40232->40234 40233 65791fa 40233->40037 40234->40233 40235 6579571 11 API calls 40234->40235 40236 6579578 11 API calls 40234->40236 40235->40234 40236->40234 40238 657957d 40237->40238 40239 6579583 40238->40239 40249 657a5d0 40238->40249 40253 657a5e0 40238->40253 40239->40223 40240 657959c 40240->40223 40245 657957d 40243->40245 40244 6579583 40244->40223 40245->40244 40247 657a5d0 11 API calls 40245->40247 40248 657a5e0 11 API calls 40245->40248 40246 657959c 40246->40223 40247->40246 40248->40246 40250 657a5dd 40249->40250 40252 657a5eb 40250->40252 40257 6570f28 40250->40257 40252->40240 40254 657a5f9 40253->40254 40255 657a5eb 40253->40255 40254->40255 40256 6570f28 11 API calls 40254->40256 40255->40240 40256->40255 40259 6570f38 40257->40259 40258 6570fa5 40258->40252 40259->40258 40263 6571470 40259->40263 40267 65711f8 40259->40267 40273 65711e9 40259->40273 40279 6571491 40263->40279 40285 65714a0 40263->40285 40264 657148e 40264->40258 40268 657124f 40267->40268 40270 6571208 40267->40270 40269 657129b 40268->40269 40301 657a620 40268->40301 40306 657a610 40268->40306 40269->40258 40270->40258 40274 657124f 40273->40274 40275 6571208 40273->40275 40276 657129b 40274->40276 40277 657a610 11 API calls 40274->40277 40278 657a620 11 API calls 40274->40278 40275->40258 40276->40258 40277->40276 40278->40276 40280 65714ad 40279->40280 40281 65714b1 40279->40281 40280->40264 40291 657169e 40281->40291 40296 65716b8 40281->40296 40282 65714d1 40282->40264 40286 65714ad 40285->40286 40287 65714b1 40285->40287 40286->40264 40289 657169e 3 API calls 40287->40289 40290 65716b8 3 API calls 40287->40290 40288 65714d1 40288->40264 40289->40288 40290->40288 40292 65716b8 40291->40292 40294 4e0ee00 CreateWindowExW CreateWindowExW CreateWindowExW 40292->40294 40295 4e0edef CreateWindowExW CreateWindowExW CreateWindowExW 40292->40295 40293 65716de 40293->40282 40294->40293 40295->40293 40297 65716c0 40296->40297 40299 4e0ee00 CreateWindowExW CreateWindowExW CreateWindowExW 40297->40299 40300 4e0edef CreateWindowExW CreateWindowExW CreateWindowExW 40297->40300 40298 65716de 40298->40282 40299->40298 40300->40298 40302 657a647 40301->40302 40311 4f5e3d7 40302->40311 40317 4f5e3fb 40302->40317 40303 657a66b 40303->40303 40307 657a624 40306->40307 40309 4f5e3d7 11 API calls 40307->40309 40310 4f5e3fb 11 API calls 40307->40310 40308 657a66b 40309->40308 40310->40308 40312 4f5e3dd 40311->40312 40313 4f5e3fc 40311->40313 40312->40303 40314 4f5e40e 40313->40314 40315 4f52750 10 API calls 40313->40315 40316 4f532d8 PostMessageW 40314->40316 40315->40314 40316->40312 40318 4f52750 10 API calls 40317->40318 40319 4f5e40e 40318->40319 40320 4f532d8 PostMessageW 40319->40320 40321 4f5e431 40320->40321 40321->40303 40322 4e092f0 40323 4e092ff 40322->40323 40326 4e093e8 40322->40326 40334 4e093d9 40322->40334 40327 4e093fb 40326->40327 40328 4e09413 40327->40328 40342 4e09660 40327->40342 40346 4e09670 40327->40346 40328->40323 40329 4e0940b 40329->40328 40330 4e09610 GetModuleHandleW 40329->40330 40331 4e0963d 40330->40331 40331->40323 40335 4e093fb 40334->40335 40336 4e09413 40335->40336 40340 4e09660 LoadLibraryExW 40335->40340 40341 4e09670 LoadLibraryExW 40335->40341 40336->40323 40337 4e0940b 40337->40336 40338 4e09610 GetModuleHandleW 40337->40338 40339 4e0963d 40338->40339 40339->40323 40340->40337 40341->40337 40343 4e09670 40342->40343 40345 4e096a9 40343->40345 40350 4e08768 40343->40350 40345->40329 40347 4e09684 40346->40347 40348 4e08768 LoadLibraryExW 40347->40348 40349 4e096a9 40347->40349 40348->40349 40349->40329 40351 4e09850 LoadLibraryExW 40350->40351 40353 4e098c9 40351->40353 40353->40345 40916 4e0b6d0 40917 4e0b736 40916->40917 40921 4e0bc88 40917->40921 40924 4e0bc98 40917->40924 40918 4e0b7e5 40927 4e0a14c 40921->40927 40925 4e0bcc6 40924->40925 40926 4e0a14c DuplicateHandle 40924->40926 40925->40918 40926->40925 40928 4e0bd00 DuplicateHandle 40927->40928 40929 4e0bcc6 40928->40929 40929->40918 40930 4f53904 40931 4f5390d 40930->40931 40934 4f5392b 40930->40934 40932 4f52750 10 API calls 40931->40932 40931->40934 40932->40934 40933 4f53a87 40934->40933 40935 4f52750 10 API calls 40934->40935 40936 4f53a64 40935->40936 40937 4f532d8 PostMessageW 40936->40937 40937->40933 40938 4f54180 40940 4f541a7 40938->40940 40939 4f54284 40939->40939 40940->40939 40942 4f53474 40940->40942 40943 4f54600 CreateActCtxA 40942->40943 40945 4f546c3 40943->40945 40354 6578b00 40355 6578b28 40354->40355 40358 6578c77 40355->40358 40359 6578c8d 40358->40359 40361 6578cb0 11 API calls 40359->40361 40362 6578c9f 11 API calls 40359->40362 40360 6578b34 40361->40360 40362->40360 40946 4e03f98 40947 4e03fa9 40946->40947 40950 4f549e1 40947->40950 40948 4e03fbb 40951 4f549d5 40950->40951 40954 4f549ef 40950->40954 40955 4f5353c 40951->40955 40954->40948 40957 4f53547 40955->40957 40959 4f5357c 40957->40959 40958 4f54aed 40962 4f53587 40959->40962 40960 4f55374 40961 4f55383 40960->40961 40964 4f54f1c OleInitialize 40960->40964 40968 4f5539b 40961->40968 40973 4f54f1c 40961->40973 40967 4f5521e 40962->40967 40962->40968 40969 4f54ee4 40962->40969 40963 4f54ee4 13 API calls 40963->40960 40964->40961 40967->40960 40967->40963 40968->40958 40970 4f54eef 40969->40970 40977 4f559c8 40970->40977 40971 4f555ab 40971->40967 40974 4f54f27 40973->40974 40975 4f5f091 40974->40975 41014 4f5dc44 40974->41014 40975->40968 40980 4f559ee 40977->40980 40978 4f55a02 40978->40971 40979 4f55adf 40981 4f55aed 40979->40981 40992 4e0c3e0 40979->40992 40999 4e0c3d1 40979->40999 40980->40978 40980->40979 40986 4f55b42 40980->40986 40982 4f52750 10 API calls 40981->40982 40985 4f55b3d 40981->40985 40983 4f55b15 40982->40983 41006 4f550d4 40983->41006 40985->40971 40986->40985 40987 4f52750 10 API calls 40986->40987 40988 4f55be7 40987->40988 40988->40985 40989 4f55120 10 API calls 40988->40989 40989->40985 40993 4e0c40e 40992->40993 40996 4e0c4df 40993->40996 40997 4f52750 10 API calls 40993->40997 41009 4f52740 40993->41009 40994 4e0c486 40995 4e0c4da KiUserCallbackDispatcher 40994->40995 40995->40996 40997->40994 41000 4e0c40e 40999->41000 41003 4e0c4df 41000->41003 41004 4f52750 10 API calls 41000->41004 41005 4f52740 10 API calls 41000->41005 41001 4e0c486 41002 4e0c4da KiUserCallbackDispatcher 41001->41002 41002->41003 41004->41001 41005->41001 41007 4f5d240 SendMessageW 41006->41007 41008 4f5d2ac 41007->41008 41008->40985 41010 4f52760 41009->41010 41011 4f5279d 41010->41011 41012 4f55d39 10 API calls 41010->41012 41013 4f55d48 10 API calls 41010->41013 41011->40994 41012->41011 41013->41011 41015 4f5dc4f 41014->41015 41016 4f5f3ab 41015->41016 41018 4f5dc60 41015->41018 41016->40975 41019 4f5f3e0 OleInitialize 41018->41019 41020 4f5f444 41019->41020 41020->41016 41021 4e06758 41022 4e0675c 41021->41022 41025 4e06344 41022->41025 41024 4e06766 41026 4e0634f 41025->41026 41029 4e06394 41026->41029 41028 4e0688d 41028->41024 41030 4e0639f 41029->41030 41033 4e063c4 41030->41033 41032 4e06962 41032->41028 41034 4e063cf 41033->41034 41037 4e063f4 41034->41037 41036 4e06a62 41036->41032 41038 4e063ff 41037->41038 41039 4e071bc 41038->41039 41042 4e0b407 41038->41042 41047 4e0b408 41038->41047 41039->41036 41043 4e0b429 41042->41043 41044 4e0b44d 41043->41044 41052 4e0b587 41043->41052 41056 4e0b5b8 41043->41056 41044->41039 41048 4e0b429 41047->41048 41049 4e0b44d 41048->41049 41050 4e0b587 12 API calls 41048->41050 41051 4e0b5b8 12 API calls 41048->41051 41049->41039 41050->41049 41051->41049 41054 4e0b58b 41052->41054 41053 4e0b5ff 41053->41044 41054->41053 41060 4e0a0ec 41054->41060 41057 4e0b5bc 41056->41057 41058 4e0b5ff 41057->41058 41059 4e0a0ec 12 API calls 41057->41059 41058->41044 41059->41058 41061 4e0a0f7 41060->41061 41063 4e0c2f8 41061->41063 41064 4e0b904 41061->41064 41063->41063 41065 4e0b90f 41064->41065 41066 4e0c367 41065->41066 41067 4e063f4 12 API calls 41065->41067 41070 4e0c3e0 11 API calls 41066->41070 41071 4e0c3d1 11 API calls 41066->41071 41067->41066 41068 4e0c375 41072 4e0e0f0 5 API calls 41068->41072 41073 4e0e0d8 5 API calls 41068->41073 41069 4e0c3a0 41069->41063 41070->41068 41071->41068 41072->41069 41073->41069 40363 6573208 40364 6573211 40363->40364 40368 6573258 40364->40368 40373 6573248 40364->40373 40365 6573242 40369 657325d 40368->40369 40378 6573290 40369->40378 40386 6573280 40369->40386 40370 6573274 40370->40365 40374 6573258 40373->40374 40376 6573290 3 API calls 40374->40376 40377 6573280 3 API calls 40374->40377 40375 6573274 40375->40365 40376->40375 40377->40375 40380 65732ae 40378->40380 40379 65732d6 40402 6573871 40379->40402 40406 6573880 40379->40406 40380->40379 40381 6573345 40380->40381 40394 6573389 40380->40394 40398 6573398 40380->40398 40381->40370 40387 65732ae 40386->40387 40388 65732d6 40387->40388 40389 6573345 40387->40389 40390 6573389 DnsQuery_A 40387->40390 40391 6573398 DnsQuery_A 40387->40391 40392 6573871 KiUserExceptionDispatcher 40388->40392 40393 6573880 KiUserExceptionDispatcher 40388->40393 40389->40370 40390->40387 40391->40387 40392->40389 40393->40389 40395 6573398 40394->40395 40410 65718fc 40395->40410 40399 65733c1 40398->40399 40400 65718fc DnsQuery_A 40399->40400 40401 6573402 40400->40401 40401->40380 40405 657387a 40402->40405 40403 6573954 40403->40381 40404 6573907 KiUserExceptionDispatcher 40404->40403 40405->40403 40405->40404 40407 6573954 40406->40407 40408 65738aa KiUserExceptionDispatcher 40406->40408 40407->40381 40408->40407 40411 6573610 DnsQuery_A 40410->40411 40413 657374a 40411->40413 40413->40413 40414 6577988 40415 657798f 40414->40415 40419 6577a15 40415->40419 40425 65779fc 40415->40425 40420 6577a28 40419->40420 40430 6579ed1 40420->40430 40438 6579edf 40420->40438 40445 6579ee0 40420->40445 40421 6577999 40426 6577a06 40425->40426 40465 6577bc8 40426->40465 40470 6577bb8 40426->40470 40427 6577a10 40427->40427 40431 6579eda 40430->40431 40432 6579ee1 40430->40432 40431->40421 40452 6577f78 40432->40452 40434 6579f0b 40435 6579f1a 40434->40435 40436 6577f78 11 API calls 40434->40436 40435->40421 40437 6579f32 40436->40437 40437->40421 40439 6579ef2 40438->40439 40440 6577f78 11 API calls 40439->40440 40441 6579f0b 40440->40441 40442 6579f1a 40441->40442 40443 6577f78 11 API calls 40441->40443 40442->40421 40444 6579f32 40443->40444 40444->40421 40446 6579ee1 40445->40446 40447 6577f78 11 API calls 40446->40447 40448 6579f0b 40447->40448 40449 6579f1a 40448->40449 40450 6577f78 11 API calls 40448->40450 40449->40421 40451 6579f32 40450->40451 40451->40421 40454 6577fa2 40452->40454 40453 6577fc8 40454->40453 40457 6579238 40454->40457 40461 6579228 40454->40461 40458 6579252 40457->40458 40459 6579275 40458->40459 40460 6578cb0 11 API calls 40458->40460 40459->40454 40459->40459 40460->40459 40464 6579252 40461->40464 40462 6579275 40462->40454 40462->40462 40463 6578cb0 11 API calls 40463->40462 40464->40462 40464->40463 40466 6577bd9 40465->40466 40469 6577f78 11 API calls 40466->40469 40475 65781a0 40466->40475 40467 6577bfc 40467->40427 40469->40467 40471 6577bc8 40470->40471 40473 65781a0 11 API calls 40471->40473 40474 6577f78 11 API calls 40471->40474 40472 6577bfc 40472->40427 40473->40472 40474->40472 40477 6577fb1 40475->40477 40476 6577fc8 40477->40476 40478 6579238 11 API calls 40477->40478 40479 6579228 11 API calls 40477->40479 40478->40477 40479->40477 41074 6575ea8 41075 6575ec2 41074->41075 41076 6574e30 11 API calls 41075->41076 41077 6575f09 41076->41077
                                        APIs
                                        • LdrInitializeThunk.NTDLL(00000001), ref: 06573A44
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID:
                                        • API String ID: 2994545307-0
                                        • Opcode ID: bbe7a6e624431be790f0eaeb9631b5de0c6c61354e46cbd6a76996f262ec2a60
                                        • Instruction ID: 6d29edcecaf84cf095910c2d983441ee3adff5cbe9cf8cb0f7c98611c1b00b70
                                        • Opcode Fuzzy Hash: bbe7a6e624431be790f0eaeb9631b5de0c6c61354e46cbd6a76996f262ec2a60
                                        • Instruction Fuzzy Hash: 533198306003048FCB54DF79D545AAEBBE6EF89214B14887DE4029B750EB3AED42CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce5eafdba53818642de34d525f5b8ab48f736372cbe467dda4cc7a1563cc9675
                                        • Instruction ID: 015490fd5f6485e2aa5e849ca5dc48aa1ae05ccd241d55d414e6b6bbc29ce3ab
                                        • Opcode Fuzzy Hash: ce5eafdba53818642de34d525f5b8ab48f736372cbe467dda4cc7a1563cc9675
                                        • Instruction Fuzzy Hash: 4A51F278E05208DFDB04EFA4E959AADBBF2FB49310F10806AE805B7354DB359A45CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 135 4e0faa0-4e0faae 136 4e0fab0-4e0fab3 135->136 137 4e0fab4-4e0face 135->137 138 4e0fad0-4e0fad3 137->138 139 4e0fad4-4e0faee 137->139 140 4e0faf0-4e0faf3 139->140 141 4e0faf4-4e0fb4e 139->141 142 4e0fb50-4e0fb53 141->142 143 4e0fb54-4e0fb60 141->143 144 4e0fb62-4e0fb6e 143->144 145 4e0fbc4-4e0fbd6 143->145 148 4e0fb70-4e0fb73 144->148 149 4e0fb74-4e0fb8e 144->149 146 4e0fbe0-4e0fc5e 145->146 147 4e0fbd8 call 4e0da04 145->147 151 4e0fc60-4e0fc66 146->151 152 4e0fc69-4e0fc70 146->152 157 4e0fbdd-4e0fbde 147->157 153 4e0fb90-4e0fb93 149->153 154 4e0fb94-4e0fba6 149->154 151->152 158 4e0fc72-4e0fc78 152->158 159 4e0fc7b-4e0fd1a CreateWindowExW 152->159 155 4e0fba8-4e0fbab 154->155 156 4e0fbac-4e0fbc3 154->156 155->156 156->145 158->159 162 4e0fd23-4e0fd5b 159->162 163 4e0fd1c-4e0fd22 159->163 167 4e0fd68 162->167 168 4e0fd5d-4e0fd60 162->168 163->162 169 4e0fd69 167->169 168->167 169->169
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: {;np${;np
                                        • API String ID: 0-2546577353
                                        • Opcode ID: d3e3b01a7201ee7f31a59acd776f9ff69a0596f7e05a37a680d65e150825bd3f
                                        • Instruction ID: 3ee180339e9fd933f7adca0cd4cd808eeba11c1ff2c25446fd5afca6f2ac30f3
                                        • Opcode Fuzzy Hash: d3e3b01a7201ee7f31a59acd776f9ff69a0596f7e05a37a680d65e150825bd3f
                                        • Instruction Fuzzy Hash: B191A971C083889FDF12CFA5C891ACDBFB1EF4A304F15819AE454AB262C375A996CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 170 6573558-6573574 171 6573576-6573587 170->171 172 657358a-65735eb 170->172 181 65735f9-6573683 172->181 182 65735c8-65735f7 172->182 187 6573685-657368f 181->187 188 65736bc-65736ef 181->188 187->188 190 6573691-6573693 187->190 198 65736f7-6573748 DnsQuery_A 188->198 192 65736b6-65736b9 190->192 193 6573695-657369f 190->193 192->188 195 65736a3-65736b2 193->195 196 65736a1 193->196 195->195 197 65736b4 195->197 196->195 197->192 199 6573751-657379e 198->199 200 657374a-6573750 198->200 205 65737a0-65737a4 199->205 206 65737ae-65737b2 199->206 200->199 205->206 207 65737a6 205->207 208 65737b4-65737b7 206->208 209 65737c1-65737c5 206->209 207->206 208->209 210 65737c7-65737d3 209->210 211 65737d6 209->211 210->211 213 65737d7 211->213 213->213
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: {;np${;np
                                        • API String ID: 0-2546577353
                                        • Opcode ID: beda59a12d635f7d90c47ea66e5a151d3de9f6a228eaf194a3a89ae937c71a81
                                        • Instruction ID: 8ae2a6e049847d8f12cce48a079cf697375797c5df176f37739a55378e8a2acb
                                        • Opcode Fuzzy Hash: beda59a12d635f7d90c47ea66e5a151d3de9f6a228eaf194a3a89ae937c71a81
                                        • Instruction Fuzzy Hash: 78817AB1D04349CFDB54CFA9E884ADEBBB1FF88314F24852AD415AB250DB70A949CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 214 65718fc-6573683 217 6573685-657368f 214->217 218 65736bc-6573748 DnsQuery_A 214->218 217->218 219 6573691-6573693 217->219 227 6573751-657379e 218->227 228 657374a-6573750 218->228 220 65736b6-65736b9 219->220 221 6573695-657369f 219->221 220->218 223 65736a3-65736b2 221->223 224 65736a1 221->224 223->223 225 65736b4 223->225 224->223 225->220 233 65737a0-65737a4 227->233 234 65737ae-65737b2 227->234 228->227 233->234 235 65737a6 233->235 236 65737b4-65737b7 234->236 237 65737c1-65737c5 234->237 235->234 236->237 238 65737c7-65737d3 237->238 239 65737d6 237->239 238->239 241 65737d7 239->241 241->241
                                        APIs
                                        • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06573738
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: Query_
                                        • String ID: {;np${;np
                                        • API String ID: 428220571-2546577353
                                        • Opcode ID: 699b121b81fe92d83c1589d8e8654c5c04230de00069c5c33fac0a27164bca7c
                                        • Instruction ID: b75c800bde99e6e3c0916d71fc260740dd10875ef07a35d39b4aa0814e0182c0
                                        • Opcode Fuzzy Hash: 699b121b81fe92d83c1589d8e8654c5c04230de00069c5c33fac0a27164bca7c
                                        • Instruction Fuzzy Hash: 395112B1D00658DFDB54CFA9D884BDEBBB1FF48314F248129E815AB250DB70A946CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 242 6573604-6573683 244 6573685-657368f 242->244 245 65736bc-65736ef 242->245 244->245 246 6573691-6573693 244->246 253 65736f7-6573748 DnsQuery_A 245->253 247 65736b6-65736b9 246->247 248 6573695-657369f 246->248 247->245 250 65736a3-65736b2 248->250 251 65736a1 248->251 250->250 252 65736b4 250->252 251->250 252->247 254 6573751-657379e 253->254 255 657374a-6573750 253->255 260 65737a0-65737a4 254->260 261 65737ae-65737b2 254->261 255->254 260->261 262 65737a6 260->262 263 65737b4-65737b7 261->263 264 65737c1-65737c5 261->264 262->261 263->264 265 65737c7-65737d3 264->265 266 65737d6 264->266 265->266 268 65737d7 266->268 268->268
                                        APIs
                                        • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06573738
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: Query_
                                        • String ID: {;np${;np
                                        • API String ID: 428220571-2546577353
                                        • Opcode ID: ca304bdfa0c3178f04117d76da383000c433b7d5c60a3926f805f51747eba2c9
                                        • Instruction ID: dce9d704f98263af3595e30dc5f36f1e484958129c7affaddcee01b70b95e703
                                        • Opcode Fuzzy Hash: ca304bdfa0c3178f04117d76da383000c433b7d5c60a3926f805f51747eba2c9
                                        • Instruction Fuzzy Hash: 5A5121B1D00259CFDB54CFA9D984BDDBBB1FF48314F24812AE815AB250DB70A946CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 269 4e0da04-4e0fc5e 271 4e0fc60-4e0fc66 269->271 272 4e0fc69-4e0fc70 269->272 271->272 273 4e0fc72-4e0fc78 272->273 274 4e0fc7b-4e0fd1a CreateWindowExW 272->274 273->274 276 4e0fd23-4e0fd5b 274->276 277 4e0fd1c-4e0fd22 274->277 281 4e0fd68 276->281 282 4e0fd5d-4e0fd60 276->282 277->276 283 4e0fd69 281->283 282->281 283->283
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04E0FD0A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID: {;np${;np
                                        • API String ID: 716092398-2546577353
                                        • Opcode ID: 5527f5d1b5c2ebf37a17bf064d2341b0521e063ca4ad09173b31f9b77f97f266
                                        • Instruction ID: 24b8e3e622f2f014b1e44bd52fda4c5db521972a23933bc7003565ebe9ae7d8b
                                        • Opcode Fuzzy Hash: 5527f5d1b5c2ebf37a17bf064d2341b0521e063ca4ad09173b31f9b77f97f266
                                        • Instruction Fuzzy Hash: 3E51B3B1D00309DFDB14CF99C984ADEBBB5FF48314F24852AE415AB250D7B5A985CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 518 4e093e8-4e093fd call 4e08704 521 4e09413-4e09417 518->521 522 4e093ff 518->522 523 4e09419-4e09423 521->523 524 4e0942b-4e0946c 521->524 571 4e09405 call 4e09660 522->571 572 4e09405 call 4e09670 522->572 523->524 529 4e09479-4e09487 524->529 530 4e0946e-4e09476 524->530 525 4e0940b-4e0940d 525->521 526 4e09548-4e09608 525->526 566 4e09610-4e0963b GetModuleHandleW 526->566 567 4e0960a-4e0960d 526->567 532 4e09489-4e0948e 529->532 533 4e094ab-4e094ad 529->533 530->529 535 4e09490-4e09497 call 4e08710 532->535 536 4e09499 532->536 534 4e094b0-4e094b7 533->534 538 4e094c4-4e094cb 534->538 539 4e094b9-4e094c1 534->539 537 4e0949b-4e094a9 535->537 536->537 537->534 542 4e094d8-4e094e1 call 4e08720 538->542 543 4e094cd-4e094d5 538->543 539->538 548 4e094e3-4e094eb 542->548 549 4e094ee-4e094f3 542->549 543->542 548->549 551 4e09511-4e09515 549->551 552 4e094f5-4e094fc 549->552 573 4e09518 call 4e09940 551->573 574 4e09518 call 4e09968 551->574 552->551 554 4e094fe-4e0950e call 4e08730 call 4e08740 552->554 554->551 555 4e0951b-4e0951e 558 4e09520-4e0953e 555->558 559 4e09541-4e09547 555->559 558->559 568 4e09644-4e09658 566->568 569 4e0963d-4e09643 566->569 567->566 569->568 571->525 572->525 573->555 574->555
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 04E0962E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: {;np
                                        • API String ID: 4139908857-507495909
                                        • Opcode ID: 91491b7225cf284635f7dc00ac1ab82762e5e8e2fb358e75e1ac3ba4abcfaad7
                                        • Instruction ID: ae6220a5e9fab76e256bf5d5d85371790a788f5fc6ee7302d3ad7b1b33c13d46
                                        • Opcode Fuzzy Hash: 91491b7225cf284635f7dc00ac1ab82762e5e8e2fb358e75e1ac3ba4abcfaad7
                                        • Instruction Fuzzy Hash: 9C7127B0A00B058FD724DF2AD48475AB7F1FF88318F00892DD59AD7A91D734F8858B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 575 4f545f4-4f545fd 576 4f545e5-4f545eb 575->576 577 4f545ff-4f5467b 575->577 578 4f54683-4f546c1 CreateActCtxA 577->578 579 4f546c3-4f546c9 578->579 580 4f546ca-4f54724 578->580 579->580 587 4f54726-4f54729 580->587 588 4f54733-4f54737 580->588 587->588 589 4f54739-4f54745 588->589 590 4f54748 588->590 589->590 592 4f54749 590->592 592->592
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 04F546B1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID: {;np
                                        • API String ID: 2289755597-507495909
                                        • Opcode ID: 02863015368134d415992d1cdf17090fabc14e178b11bf739c5ff8640bac42d3
                                        • Instruction ID: 7b167d51e2fba79d54a4e72c00f4b18357d01b91d22ae0489db3d3cd382d88d3
                                        • Opcode Fuzzy Hash: 02863015368134d415992d1cdf17090fabc14e178b11bf739c5ff8640bac42d3
                                        • Instruction Fuzzy Hash: 9341F575C00618CFDB24CFA9D884BCDBBB1FF89308F10816AD509AB260DB756986CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 593 4f53474-4f546c1 CreateActCtxA 596 4f546c3-4f546c9 593->596 597 4f546ca-4f54724 593->597 596->597 604 4f54726-4f54729 597->604 605 4f54733-4f54737 597->605 604->605 606 4f54739-4f54745 605->606 607 4f54748 605->607 606->607 609 4f54749 607->609 609->609
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 04F546B1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID: {;np
                                        • API String ID: 2289755597-507495909
                                        • Opcode ID: 6d3fe19a64dfe7cdfd1f912fd045099a93db40402de191729cb52fd3535108fa
                                        • Instruction ID: 3ef7ccccc634f3e97fedc3261fc5552cc0cede02f6f681fe69c8a0df76e86ec1
                                        • Opcode Fuzzy Hash: 6d3fe19a64dfe7cdfd1f912fd045099a93db40402de191729cb52fd3535108fa
                                        • Instruction Fuzzy Hash: BA41E371C0461CCBDB24CFA9C885B9DBBF5BF49304F108159D909BB261DB756986CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 610 4f52470-4f524ac 611 4f524b2-4f524b7 610->611 612 4f5255c-4f5257c 610->612 613 4f524b9-4f524f0 611->613 614 4f5250a-4f52542 CallWindowProcW 611->614 619 4f5257f-4f5258c 612->619 620 4f524f2-4f524f8 613->620 621 4f524f9-4f52508 613->621 615 4f52544-4f5254a 614->615 616 4f5254b-4f5255a 614->616 615->616 616->619 620->621 621->619
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 04F52531
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID: {;np
                                        • API String ID: 2714655100-507495909
                                        • Opcode ID: a560576b011ed3397d4f844809c5c0988cf9ea5334cbd7b0ed8ea59d69a26522
                                        • Instruction ID: c7981fc286bcb077d1dccf1348ad0f9e74ba930d888982eca85441ca349d5711
                                        • Opcode Fuzzy Hash: a560576b011ed3397d4f844809c5c0988cf9ea5334cbd7b0ed8ea59d69a26522
                                        • Instruction Fuzzy Hash: CE4118B5A002058FDB14CF99C488AAABBF5FB88314F158599D919AB361D774E842CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 624 4f5b898-4f5b8bd call 4f5a504 627 4f5b8d2-4f5b964 CreateIconFromResourceEx 624->627 628 4f5b8bf-4f5b8cf call 4f5b358 624->628 632 4f5b966-4f5b96c 627->632 633 4f5b96d-4f5b98a 627->633 632->633
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: CreateFromIconResource
                                        • String ID: {;np
                                        • API String ID: 3668623891-507495909
                                        • Opcode ID: 813f917ddbe87c4f7cfa366876a0c18751b9b60c0f541897eaa81133aee33960
                                        • Instruction ID: e9666c889c2e7ac221a2a7357808fe4bd20c25cdf52d02d1d04ba91d87f02f93
                                        • Opcode Fuzzy Hash: 813f917ddbe87c4f7cfa366876a0c18751b9b60c0f541897eaa81133aee33960
                                        • Instruction Fuzzy Hash: 3D31BC72804349DFCB01CFA9C844ADEBFF4EF09310F04805AEA54AB261C335A951DFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,04E0FE28,?,?,?,?), ref: 04E0FE9D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: LongWindow
                                        • String ID: {;np
                                        • API String ID: 1378638983-507495909
                                        • Opcode ID: d95dd619b872fd504d947d0db00b6a603dc81e1cd684b4d0728a6b16752b9e17
                                        • Instruction ID: 98f0a38353e9182abc6d90e26b8b164558ac7c43ff81ce3263c43713655670a3
                                        • Opcode Fuzzy Hash: d95dd619b872fd504d947d0db00b6a603dc81e1cd684b4d0728a6b16752b9e17
                                        • Instruction Fuzzy Hash: D621A9B1804248DFDB21CF95E889BCABFF4FB48314F05804AD865AB252C375A955CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PostMessageW.USER32(?,00F753E8,00000000,?), ref: 04F5E73D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID: {;np
                                        • API String ID: 410705778-507495909
                                        • Opcode ID: fa137796dd93afe405055b70c21e84c998abcb6f7b80e30f287299323a44333b
                                        • Instruction ID: 59ed4a3756233e97b6074be2ce56ee40143f1f659e2008a7afa518262426cf08
                                        • Opcode Fuzzy Hash: fa137796dd93afe405055b70c21e84c998abcb6f7b80e30f287299323a44333b
                                        • Instruction Fuzzy Hash: DB21D2B19003459FDB10CF9AD885BEEBFF4EF58320F14846AD564A7251C374A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04E0BCC6,?,?,?,?,?), ref: 04E0BD87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID: {;np
                                        • API String ID: 3793708945-507495909
                                        • Opcode ID: 6df45094151427559e52b052ac37758646b29735dddb793a4c1691813afbe594
                                        • Instruction ID: 5690990f2ee7702a8c4f7f220261eb62e3d9f4f03a54c86f46b947f834081003
                                        • Opcode Fuzzy Hash: 6df45094151427559e52b052ac37758646b29735dddb793a4c1691813afbe594
                                        • Instruction Fuzzy Hash: 1021E6B5900208AFDB10CF9AD484ADEFFF4FB48324F14841AE915A3350D374A945DFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04E0BCC6,?,?,?,?,?), ref: 04E0BD87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID: {;np
                                        • API String ID: 3793708945-507495909
                                        • Opcode ID: b890545b07dab2c131d200dcf1f04215609b8d1606587cb996b0263b518f6078
                                        • Instruction ID: e5d8d7de07a05976840afac2e25da15c11878b2a9e775bf486efc762ed606fa5
                                        • Opcode Fuzzy Hash: b890545b07dab2c131d200dcf1f04215609b8d1606587cb996b0263b518f6078
                                        • Instruction Fuzzy Hash: D521D2B5900208AFDB10CF9AD984BEEFBF8FB48324F14841AE915A3350D374A944DFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,04E096A9,00000800,00000000,00000000), ref: 04E098BA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: {;np
                                        • API String ID: 1029625771-507495909
                                        • Opcode ID: 88b4878dcd94f3155c8b71908adbea7d9b269aeacc573888ae4006c22fb26904
                                        • Instruction ID: 3a14960e7e597540c608e09328ac5cf7028621ccdc7b295b039a54997e1a5aa8
                                        • Opcode Fuzzy Hash: 88b4878dcd94f3155c8b71908adbea7d9b269aeacc573888ae4006c22fb26904
                                        • Instruction Fuzzy Hash: C61103B68002099FDB10CF9AC444BDEFBF4EB88314F14842ED429A7341C375A945CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,04F5B8B2,?,?,?,?,?), ref: 04F5B957
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: CreateFromIconResource
                                        • String ID: {;np
                                        • API String ID: 3668623891-507495909
                                        • Opcode ID: 1d305044a0f1f6cc9bc6b864df85e659ff13cee9b20296977007448448c21703
                                        • Instruction ID: c6924bdd1014a366b3a0ca405bc12e453744713a6eed7bc79bde38c40f075e08
                                        • Opcode Fuzzy Hash: 1d305044a0f1f6cc9bc6b864df85e659ff13cee9b20296977007448448c21703
                                        • Instruction Fuzzy Hash: 561159758002099FDB10CF9AC844BDEBFF8EB48364F14841AE955B3260C375A950DFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,04E096A9,00000800,00000000,00000000), ref: 04E098BA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: {;np
                                        • API String ID: 1029625771-507495909
                                        • Opcode ID: c9dad08724d9470561f999d75fc4ad0304b6aa7278a5d995ef7c062a565433ef
                                        • Instruction ID: 9bffa27b6b449273aaf5c240f73561877e6fe7273734ac6d26da37c0827f68ff
                                        • Opcode Fuzzy Hash: c9dad08724d9470561f999d75fc4ad0304b6aa7278a5d995ef7c062a565433ef
                                        • Instruction Fuzzy Hash: E411F2B69002099BDB20CF9AC444BDEBBF4EB48324F14842ED529B7741C375A945CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PostMessageW.USER32(?,00F753E8,00000000,?), ref: 04F5E73D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID: {;np
                                        • API String ID: 410705778-507495909
                                        • Opcode ID: fe2fe9cefcccfe3367d8e620d2de34714687cf15429ebf3097a300a374aa1f38
                                        • Instruction ID: 0da9fcc8ba1b813ef287c47e4cff93dfa39d84c8848ad0b3c4c16718d9218a76
                                        • Opcode Fuzzy Hash: fe2fe9cefcccfe3367d8e620d2de34714687cf15429ebf3097a300a374aa1f38
                                        • Instruction Fuzzy Hash: ED116AB58003099FDB10CF9AC485BEEBBF8FB58360F10841AE955B3250D374AA41CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,0000020A,?,?,?,?,?,?,04F5226A,?,00000000,?), ref: 04F5C435
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: {;np
                                        • API String ID: 3850602802-507495909
                                        • Opcode ID: 45ab827eaebba0e23d004aa3e4b13669fc1fde9af0a05dd3b3bb45af4708d377
                                        • Instruction ID: 26a198a362df4c2625f4239eb12fed4bacc114d64b94213323a31ae992834df5
                                        • Opcode Fuzzy Hash: 45ab827eaebba0e23d004aa3e4b13669fc1fde9af0a05dd3b3bb45af4708d377
                                        • Instruction Fuzzy Hash: 791125B58003499FDB10CF99C485BEFBFF8EB48360F108419D915A3200C374A985CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 04F5F435
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: Initialize
                                        • String ID: {;np
                                        • API String ID: 2538663250-507495909
                                        • Opcode ID: 30ea4fbffdb48af7274241a9142e11d4ce178c10d50285c980344af50bb79335
                                        • Instruction ID: a5a9c1607f2ee4356502d502121c2767a0cf248ef8bb351357e59f07782aa029
                                        • Opcode Fuzzy Hash: 30ea4fbffdb48af7274241a9142e11d4ce178c10d50285c980344af50bb79335
                                        • Instruction Fuzzy Hash: 921145B58002088FCB10CFAAC488BDEBFF4EB48324F208469D519B3250C379A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 04E0962E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: {;np
                                        • API String ID: 4139908857-507495909
                                        • Opcode ID: f96793225929b43ad87113807c536a9b368cdf311541a2530c84d9610a7f96ce
                                        • Instruction ID: 6f9205cfbe5472c42825204d12f959aafe72e1389e847829acb7f33bc07e4b15
                                        • Opcode Fuzzy Hash: f96793225929b43ad87113807c536a9b368cdf311541a2530c84d9610a7f96ce
                                        • Instruction Fuzzy Hash: 801110B6C002098FCB10CF9AD444BDEFBF4EB88324F14881AD429B7251C374A585CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,04E0FE28,?,?,?,?), ref: 04E0FE9D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.588398474.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4e00000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: LongWindow
                                        • String ID: {;np
                                        • API String ID: 1378638983-507495909
                                        • Opcode ID: 2d94e31797544c2c477f0e6ad852c2dbedddf8eec63914da8bda799110659737
                                        • Instruction ID: aa02d2d7f4e803c299468adc087991d5ab86593eb3349d4a057ad888f403c060
                                        • Opcode Fuzzy Hash: 2d94e31797544c2c477f0e6ad852c2dbedddf8eec63914da8bda799110659737
                                        • Instruction Fuzzy Hash: 921125B58002089FDB20CF8AC589BDFBBF8EB48324F10841AE915B3240C3B4A940CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,0000020A,?,?,?,?,?,?,04F5226A,?,00000000,?), ref: 04F5C435
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: {;np
                                        • API String ID: 3850602802-507495909
                                        • Opcode ID: 58a9a141bbe1c07fa674b5eb3d80badf5cd727e66339d99d2d18e5731dd38bb1
                                        • Instruction ID: c14c1fbe504ad6b3129eba67a90278b6b5d1895b6bb2fd2f7dd8bc43cb913bf6
                                        • Opcode Fuzzy Hash: 58a9a141bbe1c07fa674b5eb3d80badf5cd727e66339d99d2d18e5731dd38bb1
                                        • Instruction Fuzzy Hash: 811136B58003489FDB10CF99C488BDFBBF8EB48324F108419E915B3210C3B4A940CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000), ref: 04F5BCBD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: {;np
                                        • API String ID: 3850602802-507495909
                                        • Opcode ID: 87bd9d76d8bc1178d04a15ca2ca359246e6591215a7f497a6efdf8bec2f102fc
                                        • Instruction ID: 76ba3999f8c2fe9fd32e43452bc4e2ae86ae03666cf15fa6166f8c7f55ffd993
                                        • Opcode Fuzzy Hash: 87bd9d76d8bc1178d04a15ca2ca359246e6591215a7f497a6efdf8bec2f102fc
                                        • Instruction Fuzzy Hash: 5811F2B59007489FDB10CF9AC588BDEBBF8FB48324F108419E915B7250C375A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,00000018,00000001,?), ref: 04F5D29D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: {;np
                                        • API String ID: 3850602802-507495909
                                        • Opcode ID: c4bb5ba10570bd1f3be1beabc5146b0bef7df4636ec8bd15a256ec2eb20790fa
                                        • Instruction ID: cd364bad0673ca97bc47efdb8e1efd7f938498785acd6e9be06bf5a3d157a2d4
                                        • Opcode Fuzzy Hash: c4bb5ba10570bd1f3be1beabc5146b0bef7df4636ec8bd15a256ec2eb20790fa
                                        • Instruction Fuzzy Hash: CA1103B58013089FEB10CF9AD588BDEBBF8FB48324F108419E915B7250C3B5A984CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 04F5F435
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: Initialize
                                        • String ID: {;np
                                        • API String ID: 2538663250-507495909
                                        • Opcode ID: 74e0be4c404f4942b0302190666ad19f578a4edfcb13c151d2b6d0452257ff46
                                        • Instruction ID: 6c1aab1c4fba6c770a547eec2b931a672f6a93e8a1b203774362ef6dd8507dc1
                                        • Opcode Fuzzy Hash: 74e0be4c404f4942b0302190666ad19f578a4edfcb13c151d2b6d0452257ff46
                                        • Instruction Fuzzy Hash: 391145B59003088FDB10CF9AC488BDFBBF4EB48324F108459D619B3210C374A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000), ref: 04F5BCBD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: {;np
                                        • API String ID: 3850602802-507495909
                                        • Opcode ID: f37ed70cba0ad6693e30b7e62e34990fc5b6f1e3f7fb4a42cb12f80c6de7b16b
                                        • Instruction ID: dfe44ed4d8152d2e9a151c2ac51a36da5f4d28169c9909f7ce193ae6f118ee32
                                        • Opcode Fuzzy Hash: f37ed70cba0ad6693e30b7e62e34990fc5b6f1e3f7fb4a42cb12f80c6de7b16b
                                        • Instruction Fuzzy Hash: 9F11F2B58007499FDB10CF9AD488BDEBBF8FB48324F148419E919A7210C374A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,00000018,00000001,?), ref: 04F5D29D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.589261578.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4f50000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: {;np
                                        • API String ID: 3850602802-507495909
                                        • Opcode ID: 0bf26f02b9eb006ee9e850fe5193e3e64d5fcd6b3e3b945b9e5c6e27aa8aee81
                                        • Instruction ID: b127e8b0a52037151ea726d61433a6ddf1efd22ede0fc43f852736894863f48a
                                        • Opcode Fuzzy Hash: 0bf26f02b9eb006ee9e850fe5193e3e64d5fcd6b3e3b945b9e5c6e27aa8aee81
                                        • Instruction Fuzzy Hash: CB11D3B58013499FDB10CF9AD588BDEBBF8EB58324F148419E919A7250C375A984CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LdrInitializeThunk.NTDLL(00000001), ref: 06573A44
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID:
                                        • API String ID: 2994545307-0
                                        • Opcode ID: 19fd70624dea0fac2dc25c5f3cf7332bf5d5b7645c45cb1d33293a9ef4482692
                                        • Instruction ID: 3e2ae109fbabb0dcdadf56dc30c3c950e3ec7c5cf8690847519018c443d541f0
                                        • Opcode Fuzzy Hash: 19fd70624dea0fac2dc25c5f3cf7332bf5d5b7645c45cb1d33293a9ef4482692
                                        • Instruction Fuzzy Hash: 1B31DA306002048FCB50DF79D545AAEBBF6EF89214B14887DE4069B740EB3AED42CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL(?), ref: 06573912
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: b93e9d8ba8ae8f2350dcee55c0155827a3e8dcd49150717624e0aa6a336d46a9
                                        • Instruction ID: 5fe33cd9f60aaf60e8bd43caa57999b3c3f36625100f269ca78eeb93b8120d81
                                        • Opcode Fuzzy Hash: b93e9d8ba8ae8f2350dcee55c0155827a3e8dcd49150717624e0aa6a336d46a9
                                        • Instruction Fuzzy Hash: 0A11AF70A01115DFDB94DF69E54057EB7B5BF88320B50846ED40AD7200CB31AD4ADBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL(?), ref: 06573912
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.592756122.0000000006570000.00000040.00000800.00020000.00000000.sdmp, Offset: 06570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_6570000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 12adc4927893c3e1501f3acc4101c86a8e9f679f43d4f3e2ced576353ea24d82
                                        • Instruction ID: 90fc72d91f5ef89a8ca971594d9f3de9450b6c4a84fb40f8ec4732ce9fc92712
                                        • Opcode Fuzzy Hash: 12adc4927893c3e1501f3acc4101c86a8e9f679f43d4f3e2ced576353ea24d82
                                        • Instruction Fuzzy Hash: D4119072A0621ADFDB94DF69E5405BAF7B4FF48321B10846AD50AD7200CB31A94AEBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.571627002.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_f1d000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9efd6de03cdf60abe703174e0e5d18140bb74b911e3f51e5ba2a17fef06eadc
                                        • Instruction ID: 97f954f990c17cafbbdf31c7c2f1c4423dec00596d06f25628d87429020f1699
                                        • Opcode Fuzzy Hash: f9efd6de03cdf60abe703174e0e5d18140bb74b911e3f51e5ba2a17fef06eadc
                                        • Instruction Fuzzy Hash: 28213AB2504240DFDF04DF10D9C0F66BB75FB98324F24C5A9E9054B246C336E896EBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.571689914.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_f2d000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8abdfb7d9d56536ea9e67610fa3dfcee8ff81aef18218da7d1f12224aab83937
                                        • Instruction ID: 85faa74fca1ccc704ce60a88b758b77ce8ae7ba296af6e6ce483f2d9318db9b9
                                        • Opcode Fuzzy Hash: 8abdfb7d9d56536ea9e67610fa3dfcee8ff81aef18218da7d1f12224aab83937
                                        • Instruction Fuzzy Hash: CA210775908240DFDB14DF10E5C4B26BB65FB88324F24C5ADD90A4B26AC736D847DAA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.571689914.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_f2d000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a9eafbd23e678cbdbfa430127e1390202a77d12970138f7a862b7c876d3c916
                                        • Instruction ID: 5e68bbcdacf674885b05f4e169bca82cb5fb76e5436ede7479fafb96cda50118
                                        • Opcode Fuzzy Hash: 8a9eafbd23e678cbdbfa430127e1390202a77d12970138f7a862b7c876d3c916
                                        • Instruction Fuzzy Hash: F92192755093C08FCB12CF24D990715BF71EB46324F29C5EAD8498B6A7C33A980ADB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.571627002.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_f1d000_APPLICATION FORM MASTER SDPO Brilinskiy NEW U.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 551128e7c6d65466d091f2f15192fd2998e5dd02954581d12228b02c4d7b83aa
                                        • Instruction ID: 4861478cbec01eeadf2727324c1e3ab3a9437aaae5ceed9d3b50b987df92b928
                                        • Opcode Fuzzy Hash: 551128e7c6d65466d091f2f15192fd2998e5dd02954581d12228b02c4d7b83aa
                                        • Instruction Fuzzy Hash: D711E676804280DFCF15CF10D5C4B56BF71FB98324F28C6A9D8450B616C336E896DBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%