Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WmtuqNHPM2.exe

Overview

General Information

Sample Name:WmtuqNHPM2.exe
Analysis ID:798888
MD5:bbe4ba566d229a405da3af72193d297f
SHA1:ffb73821d698bc2e32f1a32c7adf95e66520c7a8
SHA256:aeb8e080b996a75f85bb82e2e7a42d0302735713f34fb95fff1bfb97a030e107
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Drops executable to a common third party application directory
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • WmtuqNHPM2.exe (PID: 4748 cmdline: C:\Users\user\Desktop\WmtuqNHPM2.exe MD5: BBE4BA566D229A405DA3AF72193D297F)
    • powershell.exe (PID: 1224 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • WmtuqNHPM2.exe (PID: 1804 cmdline: C:\Users\user\Desktop\WmtuqNHPM2.exe MD5: BBE4BA566D229A405DA3AF72193D297F)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "19b525d2-02f6-47c5-b606-1d038212", "Group": "Set", "Domain1": "rcontrol4sec.ddnsgeek.com", "Domain2": "127.0.0.1", "Port": 5080, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x27b0b:$a1: NanoCore.ClientPluginHost
  • 0x27ae2:$a2: NanoCore.ClientPlugin
  • 0x2cb36:$b7: LogClientException
  • 0x27af8:$b9: IClientLoggingHost
00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x8ba5:$x1: NanoCore.ClientPluginHost
  • 0x8bd2:$x2: IClientNetworkHost
00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x8ba5:$x2: NanoCore.ClientPluginHost
  • 0x9b74:$s2: FileCommand
  • 0xe576:$s4: PipeCreated
  • 0x8bbf:$s5: IClientLoggingHost
00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x8b7f:$x2: NanoCore.ClientPlugin
  • 0x8ba5:$x3: NanoCore.ClientPluginHost
  • 0x8b70:$i3: IClientNetwork
  • 0x8b95:$i5: IClientDataHost
  • 0x8bbf:$i6: IClientLoggingHost
  • 0x8bd2:$i7: IClientNetworkHost
  • 0x8be5:$i9: IClientNameObjectCollection
  • 0x8902:$s1: ClientPlugin
  • 0x8b88:$s1: ClientPlugin
00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x8ba5:$a1: NanoCore.ClientPluginHost
  • 0x8b7f:$a2: NanoCore.ClientPlugin
  • 0x8bbf:$b9: IClientLoggingHost
Click to see the 100 entries
SourceRuleDescriptionAuthorStrings
3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x5b99:$x1: NanoCore.ClientPluginHost
  • 0x5bb3:$x2: IClientNetworkHost
3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x5b99:$x2: NanoCore.ClientPluginHost
  • 0x6bce:$s4: PipeCreated
  • 0x5b86:$s5: IClientLoggingHost
3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x5b70:$x2: NanoCore.ClientPlugin
  • 0x5b99:$x3: NanoCore.ClientPluginHost
  • 0x5b61:$i3: IClientNetwork
  • 0x5b86:$i6: IClientLoggingHost
  • 0x5bb3:$i7: IClientNetworkHost
  • 0x59d4:$s1: ClientPlugin
  • 0x5b79:$s1: ClientPlugin
  • 0x5e84:$s2: EndPoint
  • 0x5e8d:$s3: IPAddress
  • 0x5e97:$s4: IPEndPoint
3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x5b99:$a1: NanoCore.ClientPluginHost
  • 0x5b70:$a2: NanoCore.ClientPlugin
  • 0x5b86:$b9: IClientLoggingHost
3.2.WmtuqNHPM2.exe.5640000.24.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x605:$x1: NanoCore.ClientPluginHost
  • 0x63e:$x2: IClientNetworkHost
Click to see the 279 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\WmtuqNHPM2.exe, ProcessId: 1804, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\WmtuqNHPM2.exe, ProcessId: 1804, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\WmtuqNHPM2.exe, ProcessId: 1804, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\WmtuqNHPM2.exe, ProcessId: 1804, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.48.8.8.858565532834936 02/05/23-22:13:01.009276
SID:2834936
Source Port:58565
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969650802025019 02/05/23-22:12:42.607812
SID:2025019
Source Port:49696
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969850802816766 02/05/23-22:12:55.969019
SID:2816766
Source Port:49698
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.852239532834936 02/05/23-22:13:07.004800
SID:2834936
Source Port:52239
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.859683532834936 02/05/23-22:12:48.706302
SID:2834936
Source Port:59683
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970250802816766 02/05/23-22:13:21.381361
SID:2816766
Source Port:49702
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.855570532834936 02/05/23-22:13:46.917410
SID:2834936
Source Port:55570
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970350802025019 02/05/23-22:13:26.785835
SID:2025019
Source Port:49703
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970750802025019 02/05/23-22:13:53.371030
SID:2025019
Source Port:49707
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970850802816766 02/05/23-22:14:01.617464
SID:2816766
Source Port:49708
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969550802816766 02/05/23-22:12:36.467761
SID:2816766
Source Port:49695
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.856807532834936 02/05/23-22:13:13.564883
SID:2834936
Source Port:56807
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.859446532834936 02/05/23-22:14:00.808827
SID:2834936
Source Port:59446
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970850802025019 02/05/23-22:14:01.155093
SID:2025019
Source Port:49708
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.860686532834936 02/05/23-22:13:26.675466
SID:2834936
Source Port:60686
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970150802025019 02/05/23-22:13:13.802670
SID:2025019
Source Port:49701
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969550802025019 02/05/23-22:12:34.327373
SID:2025019
Source Port:49695
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969950802025019 02/05/23-22:13:01.066179
SID:2025019
Source Port:49699
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:185.81.157.236192.168.2.45080496982810290 02/05/23-22:12:55.383837
SID:2810290
Source Port:5080
Destination Port:49698
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.861124532834936 02/05/23-22:13:33.702804
SID:2834936
Source Port:61124
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970050802025019 02/05/23-22:13:07.182076
SID:2025019
Source Port:49700
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970350802816766 02/05/23-22:13:28.533812
SID:2816766
Source Port:49703
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970150802816718 02/05/23-22:13:14.238501
SID:2816718
Source Port:49701
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970450802025019 02/05/23-22:13:33.759288
SID:2025019
Source Port:49704
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970750802816766 02/05/23-22:13:55.082898
SID:2816766
Source Port:49707
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970250802025019 02/05/23-22:13:20.465789
SID:2025019
Source Port:49702
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970050802816766 02/05/23-22:13:08.202184
SID:2816766
Source Port:49700
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.850911532834936 02/05/23-22:12:42.244175
SID:2834936
Source Port:50911
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969850802025019 02/05/23-22:12:54.927420
SID:2025019
Source Port:49698
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969650802816766 02/05/23-22:12:43.716857
SID:2816766
Source Port:49696
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.856572532834936 02/05/23-22:12:33.158126
SID:2834936
Source Port:56572
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:185.81.157.236192.168.2.45080496982841753 02/05/23-22:12:59.968145
SID:2841753
Source Port:5080
Destination Port:49698
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969950802816766 02/05/23-22:13:02.138518
SID:2816766
Source Port:49699
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970550802025019 02/05/23-22:13:40.652150
SID:2025019
Source Port:49705
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970450802816766 02/05/23-22:13:34.738607
SID:2816766
Source Port:49704
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.861007532834936 02/05/23-22:13:20.247193
SID:2834936
Source Port:61007
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970650802816766 02/05/23-22:13:47.957729
SID:2816766
Source Port:49706
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970150802816766 02/05/23-22:13:15.190241
SID:2816766
Source Port:49701
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969750802816766 02/05/23-22:12:49.673877
SID:2816766
Source Port:49697
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.864906532834936 02/05/23-22:13:53.251157
SID:2834936
Source Port:64906
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364969750802025019 02/05/23-22:12:48.883083
SID:2025019
Source Port:49697
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.859444532834936 02/05/23-22:13:40.377957
SID:2834936
Source Port:59444
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970550802816766 02/05/23-22:13:41.829847
SID:2816766
Source Port:49705
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.48.8.8.864167532834936 02/05/23-22:12:54.870549
SID:2834936
Source Port:64167
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4185.81.157.2364970650802025019 02/05/23-22:13:46.971431
SID:2025019
Source Port:49706
Destination Port:5080
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: WmtuqNHPM2.exeReversingLabs: Detection: 36%
Source: WmtuqNHPM2.exeVirustotal: Detection: 46%Perma Link
Source: WmtuqNHPM2.exeAvira: detected
Source: rcontrol4sec.ddnsgeek.comAvira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Roaming\Adobe\Flash Player.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
Source: C:\Users\user\AppData\Roaming\Adobe\Flash Player.exeReversingLabs: Detection: 44%
Source: C:\Users\user\AppData\Roaming\Adobe\Flash Player.exeVirustotal: Detection: 46%Perma Link
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTR
Source: WmtuqNHPM2.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\Adobe\Flash Player.exeJoe Sandbox ML: detected
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 0.0.WmtuqNHPM2.exe.d50000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpackAvira: Label: TR/NanoCore.fadte
Source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "19b525d2-02f6-47c5-b606-1d038212", "Group": "Set", "Domain1": "rcontrol4sec.ddnsgeek.com", "Domain2": "127.0.0.1", "Port": 5080, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
Source: WmtuqNHPM2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: WmtuqNHPM2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: WmtuqNHPM2.exe, 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0189E5D8

Networking

barindex
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:56572 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49695 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49695 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:50911 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49696 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49696 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:59683 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49697 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49697 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:64167 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49698 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49698 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 185.81.157.236:5080 -> 192.168.2.4:49698
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 185.81.157.236:5080 -> 192.168.2.4:49698
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:58565 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49699 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49699 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:52239 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49700 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49700 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:56807 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49701 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49701 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49701 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:61007 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49702 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49702 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:60686 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49703 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49703 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:61124 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49704 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49704 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:59444 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49705 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49705 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:55570 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49706 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49706 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:64906 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49707 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49707 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2834936 ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com) 192.168.2.4:59446 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49708 -> 185.81.157.236:5080
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49708 -> 185.81.157.236:5080
Source: Malware configuration extractorURLs: rcontrol4sec.ddnsgeek.com
Source: Malware configuration extractorURLs: 127.0.0.1
Source: Joe Sandbox ViewASN Name: INU-ASFR INU-ASFR
Source: global trafficTCP traffic: 192.168.2.4:49695 -> 185.81.157.236:5080
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
Source: WmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: WmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
Source: WmtuqNHPM2.exe, 00000000.00000002.373707879.0000000005800000.00000004.08000000.00040000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.0000000004824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
Source: WmtuqNHPM2.exe, 00000000.00000002.373707879.0000000005800000.00000004.08000000.00040000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.0000000004824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
Source: unknownDNS traffic detected: queries for: rcontrol4sec.ddnsgeek.com
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTR

System Summary

barindex
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5640000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5640000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5640000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5630000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5630000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5630000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6dce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6dce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6dce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6dc4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6dc4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6dc4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6d40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3bf81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3bf81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3bf81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d60000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6d60000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d60000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5370000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5370000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5370000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.51e0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.51e0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.51e0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5640000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5640000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5640000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5380000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5380000.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5380000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3bee5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3bee5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3bee5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5620000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5620000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5620000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5380000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5380000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5380000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5630000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5630000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5630000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.5370000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.5370000.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.5370000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: WmtuqNHPM2.exe, WindowsFormsApp95/Fox.csLarge array initialization: ToBuffers: array initializer size 1339758
Source: WmtuqNHPM2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5640000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5640000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5640000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5640000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d70000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5630000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5630000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5630000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5630000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6dce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6dce8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6dc4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dc4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dc4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6dc4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d40000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d50000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3bf81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3bf81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3bf81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3bf81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d60000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d60000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d60000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d60000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.3325394.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5370000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5370000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5370000.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5370000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.51e0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.51e0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.51e0000.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.51e0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.WmtuqNHPM2.exe.3f37e0c.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6dc0000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.3325394.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5640000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5640000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5640000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5640000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.WmtuqNHPM2.exe.3f323e1.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c22500.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6d80000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3ec24cc.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5380000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5380000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5380000.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5380000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6da0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3bee5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3bee5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3bee5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3bee5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.4824760.1.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 3.2.WmtuqNHPM2.exe.5620000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5620000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5620000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5620000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c70968.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5380000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5380000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5380000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5380000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.6df0000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5630000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5630000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5630000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5630000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c8a9dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.3be9930.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.5370000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5370000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.5370000.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.5370000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c12ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.WmtuqNHPM2.exe.3f40c3b.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.4824760.1.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.WmtuqNHPM2.exe.2c84fa4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.WmtuqNHPM2.exe.5800000.9.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 0.2.WmtuqNHPM2.exe.45a4740.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 0.2.WmtuqNHPM2.exe.5800000.9.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 0.2.WmtuqNHPM2.exe.45a4740.4.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 0.2.WmtuqNHPM2.exe.4464720.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.373707879.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: HKTL_NET_NAME_DotNetInject date = 2021-01-22, author = Arnim Rupp, description = Detects .NET red/black-team tools via name, reference = https://github.com/dtrizna/DotNetInject, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-06-28
Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_018911180_2_01891118
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_018913C10_2_018913C1
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_018913D00_2_018913D0
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_0575236C0_2_0575236C
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057CE6D30_2_057CE6D3
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057C12780_2_057C1278
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057C92000_2_057C9200
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057C2BE80_2_057C2BE8
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057CC5890_2_057CC589
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057CE7490_2_057CE749
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057C91F10_2_057C91F1
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057C935D0_2_057C935D
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A947800_2_05A94780
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A9A8400_2_05A9A840
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A9A4CD0_2_05A9A4CD
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A947570_2_05A94757
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A94DB50_2_05A94DB5
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A9A8300_2_05A9A830
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_06E039703_2_06E03970
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_06DF46D33_2_06DF46D3
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_06DF42EB3_2_06DF42EB
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_06DF33243_2_06DF3324
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_02B6E4803_2_02B6E480
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_02B6E4713_2_02B6E471
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_02B6BBD43_2_02B6BBD4
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_0512F5F83_2_0512F5F8
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_051297883_2_05129788
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_0512A5D03_2_0512A5D0
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_0512A5E33_2_0512A5E3
Source: WmtuqNHPM2.exe, 00000000.00000000.295986420.0000000000E9C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDS Signee.exe" vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000000.00000002.373707879.0000000005800000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDrwkpobwonymr.dll" vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDrwkpobwonymr.dll" vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000000.00000002.377491458.000000000666C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDS Signee.exe" vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000000.00000002.361584928.0000000004824000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDrwkpobwonymr.dll" vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579551612.0000000006DE8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579396651.0000000006DA8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000003.372540102.0000000000DD5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579753153.0000000006DFE000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exeBinary or memory string: OriginalFilenameDS Signee.exe" vs WmtuqNHPM2.exe
Source: WmtuqNHPM2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Flash Player.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: WmtuqNHPM2.exeReversingLabs: Detection: 36%
Source: WmtuqNHPM2.exeVirustotal: Detection: 46%
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeFile read: C:\Users\user\Desktop\WmtuqNHPM2.exeJump to behavior
Source: WmtuqNHPM2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\WmtuqNHPM2.exe C:\Users\user\Desktop\WmtuqNHPM2.exe
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: C:\Users\user\Desktop\WmtuqNHPM2.exe C:\Users\user\Desktop\WmtuqNHPM2.exe
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: C:\Users\user\Desktop\WmtuqNHPM2.exe C:\Users\user\Desktop\WmtuqNHPM2.exeJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeFile created: C:\Users\user\AppData\Roaming\Adobe\Flash Player.exeJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mwewao31.inp.ps1Jump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@6/11@14/1
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: WmtuqNHPM2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{19b525d2-02f6-47c5-b606-1d038212d191}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1312:120:WilError_01
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: WmtuqNHPM2.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: WmtuqNHPM2.exeStatic file information: File size 1346560 > 1048576
Source: WmtuqNHPM2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: WmtuqNHPM2.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x148200
Source: WmtuqNHPM2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: WmtuqNHPM2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: WmtuqNHPM2.exe, 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.5690000.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.373170392.0000000005690000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTR
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_01895261 push cs; ret 0_2_01895262
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_057C4B3E push eax; iretd 0_2_057C4B3F
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A9AFC8 pushad ; ret 0_2_05A9AFC9
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 0_2_05A9AFCB push esp; ret 0_2_05A9AFD1
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_05120331 push ecx; retf 3_2_05120333
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_051269F8 pushad ; retf 3_2_051269F9
Source: WmtuqNHPM2.exeStatic PE information: 0xB1B15392 [Fri Jun 20 11:54:58 2064 UTC]
Source: initial sampleStatic PE information: section name: .text entropy: 7.998830102245729
Source: initial sampleStatic PE information: section name: .text entropy: 7.998830102245729
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeFile written: C:\Users\user\AppData\Roaming\Adobe\Flash Player.exeJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeFile created: C:\Users\user\AppData\Roaming\Adobe\Flash Player.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeFile opened: C:\Users\user\Desktop\WmtuqNHPM2.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: WmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\WmtuqNHPM2.exe TID: 2788Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2040Thread sleep time: -15679732462653109s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exe TID: 4768Thread sleep time: -12912720851596678s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9405Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWindow / User API: threadDelayed 9526Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWindow / User API: foregroundWindowGot 657Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWindow / User API: foregroundWindowGot 745Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: WmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
Source: WmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual?hal9th@johndoe
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: Base64 decoded start-sleep -seconds 20
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: Base64 decoded start-sleep -seconds 20Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeMemory written: C:\Users\user\Desktop\WmtuqNHPM2.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==Jump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeProcess created: C:\Users\user\Desktop\WmtuqNHPM2.exe C:\Users\user\Desktop\WmtuqNHPM2.exeJump to behavior
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.00000000031D4000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.580165209.000000000739C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
Source: WmtuqNHPM2.exe, 00000003.00000002.580540079.0000000007B1B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.000000000300E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.000000000313B000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.00000000031E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager,$*
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.00000000031D4000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.000000000300E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.00000000031F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerX
Source: WmtuqNHPM2.exe, 00000003.00000002.580659397.0000000007E5E000.00000004.00000010.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.580592628.0000000007C5C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager 4L0s
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Users\user\Desktop\WmtuqNHPM2.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Users\user\Desktop\WmtuqNHPM2.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeCode function: 3_2_06E03180 GetSystemTimes,3_2_06E03180
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\WmtuqNHPM2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTR

Remote Access Functionality

barindex
Source: WmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: WmtuqNHPM2.exe, 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: WmtuqNHPM2.exe, 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: WmtuqNHPM2.exe, 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
Source: WmtuqNHPM2.exe, 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: WmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: WmtuqNHPM2.exe, 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: WmtuqNHPM2.exe, 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c4d051.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43b7698.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c3458d.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b0000.19.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.43df6b8.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.53b4629.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.WmtuqNHPM2.exe.3c48a28.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.442f6d8.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.WmtuqNHPM2.exe.426f0f0.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: WmtuqNHPM2.exe PID: 1804, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Registry Run Keys / Startup Folder
112
Process Injection
1
Disable or Modify Tools
11
Input Capture
1
System Time Discovery
Remote Services11
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
PowerShell
Boot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
11
Deobfuscate/Decode Files or Information
LSASS Memory1
File and Directory Discovery
Remote Desktop Protocol11
Input Capture
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
Obfuscated Files or Information
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
Software Packing
NTDS211
Security Software Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA Secrets2
Process Discovery
SSHKeyloggingData Transfer Size Limits11
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common11
Masquerading
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items21
Virtualization/Sandbox Evasion
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job112
Process Injection
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
Hidden Files and Directories
/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
WmtuqNHPM2.exe37%ReversingLabsByteCode-MSIL.Trojan.Heracles
WmtuqNHPM2.exe46%VirustotalBrowse
WmtuqNHPM2.exe100%AviraTR/Dropper.MSIL.Gen
WmtuqNHPM2.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Adobe\Flash Player.exe100%AviraTR/Dropper.MSIL.Gen
C:\Users\user\AppData\Roaming\Adobe\Flash Player.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Adobe\Flash Player.exe45%ReversingLabsByteCode-MSIL.Trojan.Heracles
C:\Users\user\AppData\Roaming\Adobe\Flash Player.exe46%VirustotalBrowse
SourceDetectionScannerLabelLinkDownload
3.2.WmtuqNHPM2.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
0.0.WmtuqNHPM2.exe.d50000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
3.2.WmtuqNHPM2.exe.53b0000.19.unpack100%AviraTR/NanoCore.fadteDownload File
SourceDetectionScannerLabelLink
rcontrol4sec.ddnsgeek.com2%VirustotalBrowse
SourceDetectionScannerLabelLink
http://james.newtonking.com/projects/json0%URL Reputationsafe
127.0.0.10%Avira URL Cloudsafe
rcontrol4sec.ddnsgeek.com100%Avira URL Cloudmalware
rcontrol4sec.ddnsgeek.com2%VirustotalBrowse
127.0.0.11%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
rcontrol4sec.ddnsgeek.com
185.81.157.236
truetrueunknown
NameMaliciousAntivirus DetectionReputation
rcontrol4sec.ddnsgeek.comtrue
  • 2%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
127.0.0.1true
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://www.nuget.org/packages/Newtonsoft.Json.BsonWmtuqNHPM2.exe, 00000000.00000002.373707879.0000000005800000.00000004.08000000.00040000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.0000000004824000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    https://api.telegram.org/botWmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://google.comWmtuqNHPM2.exe, 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmpfalse
        high
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWmtuqNHPM2.exe, 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://james.newtonking.com/projects/jsonWmtuqNHPM2.exe, 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.newtonsoft.com/jsonschemaWmtuqNHPM2.exe, 00000000.00000002.373707879.0000000005800000.00000004.08000000.00040000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, WmtuqNHPM2.exe, 00000000.00000002.361584928.0000000004824000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.81.157.236
            rcontrol4sec.ddnsgeek.comFrance
            198375INU-ASFRtrue
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:798888
            Start date and time:2023-02-05 22:11:09 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 9m 57s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample file name:WmtuqNHPM2.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@6/11@14/1
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 92%
            • Number of executed functions: 301
            • Number of non-executed functions: 9
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtDeviceIoControlFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            22:12:08API Interceptor45x Sleep call for process: powershell.exe modified
            22:12:31API Interceptor780x Sleep call for process: WmtuqNHPM2.exe modified
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            INU-ASFRdocument.vbsGet hashmaliciousBrowse
            • 185.81.157.186
            file.exeGet hashmaliciousBrowse
            • 185.81.157.202
            Package-Amazon.wsfGet hashmaliciousBrowse
            • 185.81.157.71
            S99TFoVa0v.elfGet hashmaliciousBrowse
            • 91.234.104.231
            infected.ps1Get hashmaliciousBrowse
            • 185.81.157.14
            1.ps1Get hashmaliciousBrowse
            • 185.81.157.59
            Info-Relev#U00e9-fiscal.vbsGet hashmaliciousBrowse
            • 185.81.157.213
            Info-Releve-fiscal.vbsGet hashmaliciousBrowse
            • 185.81.157.213
            ReleveID0021558606.vbsGet hashmaliciousBrowse
            • 185.81.157.33
            InfoReleveID0012551586503.vbsGet hashmaliciousBrowse
            • 185.81.157.136
            Info_Releve_ID00215002501.vbsGet hashmaliciousBrowse
            • 185.81.157.136
            InfoReleveID00215002504.vbsGet hashmaliciousBrowse
            • 185.81.157.136
            InfoReleveID002155207.vbsGet hashmaliciousBrowse
            • 185.81.157.210
            Info_Relev#U00e9_fiscal.vbsGet hashmaliciousBrowse
            • 185.81.157.59
            Info_Releve_ID21002502.vbsGet hashmaliciousBrowse
            • 185.81.157.65
            Info_Releve_ID0021558010.vbsGet hashmaliciousBrowse
            • 185.81.157.117
            Info_Releve_ID002155802.vbsGet hashmaliciousBrowse
            • 185.81.157.117
            Info_Relev#U00e9_fiscal.vbsGet hashmaliciousBrowse
            • 185.81.157.59
            Info_Relev#U00e9_fiscal.vbsGet hashmaliciousBrowse
            • 185.81.157.59
            Info_Releve_ID00215001.vbsGet hashmaliciousBrowse
            • 185.81.157.136
            No context
            No context
            Process:C:\Users\user\Desktop\WmtuqNHPM2.exe
            File Type:ASCII text, with CRLF line terminators
            Category:modified
            Size (bytes):1039
            Entropy (8bit):5.3436815157474165
            Encrypted:false
            SSDEEP:24:ML9E4Ks2EAE4Kzr7RKDE4KhK3VZ9pKhyE4KdE4KBLWE4Ks:MxHKXEAHKzvRYHKhQnoyHKdHKBqHKs
            MD5:20799406D8EAB97C5485A916A278ED0D
            SHA1:8547571BD0A17ED48FBECDE6D5E4749A66933D53
            SHA-256:BDDBB29FA099BDEB1C409FE844BDA2820D0550E0C97F7A64E01A0EAE4DBDF067
            SHA-512:CA887D0283B3B65BDFA91C90FAAD4C485B3861EEE54C1E6C3A7563DA77DD0D59AC20207259084E2A85E8FC25A48EB805E86904DA60B4C165B03B4A7D758C7506
            Malicious:true
            Reputation:moderate, very likely benign file
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Numerics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..2,"System.Data, Version=4.0.0.0, Culture=neutra
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):5829
            Entropy (8bit):4.902247628650607
            Encrypted:false
            SSDEEP:96:3CJ2Woe5F2k6Lm5emmXIGegyg12jDs+un/iQLEYFjDaeWJ6KGcmXs9smEFRLcU6j:Wxoe5FVsm5emdzgkjDt4iWN3yBGHc9s8
            MD5:F948233D40FE29A0FFB67F9BB2F050B5
            SHA1:9A815D3F218A9374788F3ECF6BE3445F14B414D8
            SHA-256:C18202AA4EF262432135AFF5139D0981281F528918A2EEA3858B064DFB66BE4F
            SHA-512:FD86A2C713FFA10FC083A34B60D7447DCB0622E83CC5992BBDAB8B3C7FEB7150999A68A8A9B055F263423478C0879ED462B7669FDE7067BC829D79DD3974787C
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:PSMODULECACHE.............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script................T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):16592
            Entropy (8bit):5.542066179027588
            Encrypted:false
            SSDEEP:384:gte/Y7sH/gBEZJQlTz+pkLSBxnHgjuVtiJ9gGSJ3uzi13Yv:lfga6L4xHgSVBGcu1v
            MD5:65DBB4F037A4303ADEFFF74F62BC61BB
            SHA1:61ADB67BDE41C4008BD1BF79C5D786CD7777A917
            SHA-256:31B9A26860543E3DD81BB61D069FE78697026BFF2DDBC9E416405018D80C8720
            SHA-512:9E3A4F3F3578F8A318BD1EC8DA983CDE6941EC9E5F4DB0A5A3D47A82D58B70AD13CF1E3C1389BA4B58DB26A85869CB245AF5A64E97CA8D0B3DF45B1D21FCC57D
            Malicious:false
            Reputation:low
            Preview:@...e...........................2...:................@..........H...............<@.^.L."My...:'..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.............System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Reputation:high, very likely benign file
            Preview:1
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Preview:1
            Process:C:\Users\user\Desktop\WmtuqNHPM2.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1346560
            Entropy (8bit):7.9984379769425455
            Encrypted:true
            SSDEEP:24576:8ixNAopnJcU4TgHosbIY95AcS1h9VOzYJ0Natxb:8iFpnx4TUosbIYEcSGQ06
            MD5:BBE4BA566D229A405DA3AF72193D297F
            SHA1:FFB73821D698BC2E32F1A32C7ADF95E66520C7A8
            SHA-256:AEB8E080B996A75F85BB82E2E7A42D0302735713F34FB95FFF1BFB97A030E107
            SHA-512:A3BA9225B2719F482F807FE91217CDCCBB9C415D54A8CD4531960BF20456868BA7FB1BE2E473C26F306C33B74615A6F5192F0C852DCA25C66E6D63A4CBB25529
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 45%
            • Antivirus: Virustotal, Detection: 46%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....S................0............../... ........@.. ....................................`................................../..O.......l...........................x/............................................... ............... ..H............text...\.... ...................... ..`.rsrc...l...........................@..@.reloc..............................@..B................./......H........#..p............................................................(....*..(....*..0..~.........+q. nq.......%.....(......s.....s.......s....s.........o........,...o......o.......%.,..o......,..o.....&........X...2..*..*...4....6..@........(..V........".>`..........ej........*..(....*..0..........r...p.....(......"...%......(.....%......(.....%..$...(.....%..$...(..........(....s......o......~....o.....~ ....'...(....r...pr...p.(!....."...%......(.....("....o#....~$...o
            Process:C:\Users\user\Desktop\WmtuqNHPM2.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\WmtuqNHPM2.exe
            File Type:data
            Category:dropped
            Size (bytes):248
            Entropy (8bit):7.094528505897445
            Encrypted:false
            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7r3l3TmKEt5mT1DhFtMhXvvHOxHB3GDq:X4LEnybgCFCtvd7bl3ThE4T19FtMhXvs
            MD5:061E700FE27D852034A5A44BF5985CCF
            SHA1:15B072DE6D6FDD92AE36F074345FA41985833E8D
            SHA-256:4BBB88AF530693EB4A710B0591D4BAF585837242C5690F5A821BF2FC9CC587CD
            SHA-512:CF6C5458AB50C859740490985D1E7E887D1116F3FA947FF2EC49AF9997A42F3402C63EF42B93498544195D9859FBB19CCC295966564B30F5ADB4A36D4E8886C6
            Malicious:false
            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL....f.Z#.|...@HkG....G..O*V..........pz...."....r...w&&|..c..3}~.....~...os..f.......4..1.gJ.'.d".L...A.t...F.{....C.|&.w
            Process:C:\Users\user\Desktop\WmtuqNHPM2.exe
            File Type:data
            Category:dropped
            Size (bytes):8
            Entropy (8bit):3.0
            Encrypted:false
            SSDEEP:3:v6:y
            MD5:964A446FF1715498B235D5D011A2109D
            SHA1:B1D766A26CFFE4C9893B99A117416019832808CE
            SHA-256:802FDDABB05B022050C084069665F1055AF2516F320B85D3429DA1A2727EF48E
            SHA-512:F87AF7D409E0FCADD24AA454F013707381A4AE0A71770944CA3DF734C8E573E4055685C0005030B60D796E05915D08216AD93B500C7AB102923567A6178DB9D7
            Malicious:true
            Preview:.......H
            Process:C:\Users\user\Desktop\WmtuqNHPM2.exe
            File Type:data
            Category:dropped
            Size (bytes):40
            Entropy (8bit):5.153055907333276
            Encrypted:false
            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
            MD5:4E5E92E2369688041CC82EF9650EDED2
            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
            Malicious:false
            Preview:9iH...}Z.4..f.~a........~.~.......3.U.
            Process:C:\Users\user\Desktop\WmtuqNHPM2.exe
            File Type:data
            Category:dropped
            Size (bytes):329840
            Entropy (8bit):7.999431858086539
            Encrypted:true
            SSDEEP:6144:2JUYKN0AL336OXchpvDZhPsrBmnKF/CMnFWxayceW6wElU16sY8:SxKN0S6OshPKrBTF/C9cycepwE3b8
            MD5:9288D88823EFAAD00763F5F9128459FF
            SHA1:78BDD07D4B419E49DCCC3924A41AD92E3B397B23
            SHA-256:5A7678C34A7502234C3151E49D68917F3C68CB83087A5ED9EA8829183D51FBAD
            SHA-512:2A7204479E453A4857A10870A450783C548CD784AB3EA29516B8FF4816EF30841346C4CE3B2ABCD3C24410AFE71903B3C632C408B05FF4F5A2DBCD78A167C35D
            Malicious:false
            Preview:.A.<.-.K......59.. b.FDn..J.y...#.;).x#.4...$..h.a.N.2m....uG..]7........JTv..1..'.Ke.R..z...%!.1.Wo%.%....u..xdCy!d+....|Y..k.(....XL.../Z..W'......1o._40.......f.ii6[..g.j@m+..{:&).N...+l{.hQ+.......(FF._.Y.u.....l...U..J..EA.5k...(.......L...qB#e.[.2P:B.W.r..;...KV)Yj....{..N...........R.z.t/.K..A....G.wkZ..&(....r.)..zt..?kK.$3&B!f.=.4..^..3...~..u.+%....n.RV.n....[.&......n.......v..,...]).<a.D)....>%./.*..O0...C...b.Ul.>....h..8......I..Fm.G5K....4H......,.3....0zf......[.../....."..c...-.7F).bXq..$7...C...OT.M.u........,3..,......v..-..G.....N....wf0!............ ."..:..(..,?.S...<F$.]..2.....n..IV[....k...x)E._.../x...'6.f...Z\....:.X..}...t..R.m...I. .s........T.q......"t<.!....s.9..V..*:......1.b/..x.A....7.>..j~...e...wT.U$O.Y` .R..C...&.-v*.8...:....8..<&R...X...B...w...........c.>...=m.......C.<...K....A....{........Xdx.X..O2.~.3X..'x.~B..}LD`.@cC.Do.F..P......!dp...W.....U3.*.V..w..^...\)...:.M...I.K.!.s;.,^.v...c......
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):7.9984379769425455
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            • Win32 Executable (generic) a (10002005/4) 49.78%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            File name:WmtuqNHPM2.exe
            File size:1346560
            MD5:bbe4ba566d229a405da3af72193d297f
            SHA1:ffb73821d698bc2e32f1a32c7adf95e66520c7a8
            SHA256:aeb8e080b996a75f85bb82e2e7a42d0302735713f34fb95fff1bfb97a030e107
            SHA512:a3ba9225b2719f482f807fe91217cdccbb9c415d54a8cd4531960bf20456868ba7fb1be2e473c26f306c33b74615a6f5192f0c852dca25c66e6d63a4cbb25529
            SSDEEP:24576:8ixNAopnJcU4TgHosbIY95AcS1h9VOzYJ0Natxb:8iFpnx4TUosbIYEcSGQ06
            TLSH:7455332539A0AD74E234847C892BF74C2561F101F984A88FE49FD7EBCD8A78457B392D
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....S................0............../... ........@.. ....................................`................................
            Icon Hash:00828e8e8686b000
            Entrypoint:0x402fe6
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0xB1B15392 [Fri Jun 20 11:54:58 2064 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            pop ds
            mov ecx, dword ptr [eax]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax+eax], al
            fdiv st(5), st(0)
            pop es
            jl 00007F60551507B6h
            lds edi, edi
            aas
            mov gs, di
            out dx, al
            pop ebp
            test dword ptr [eax], edx
            mov dl, 49h
            dec eax
            inc edx
            jmp far EB05h : 00F394A2h
            fiadd word ptr [ecx+161B0580h]
            push esp
            aam 60h
            and eax, 12091748h
            inc eax
            movsb
            lodsb
            pop eax
            mov cl, 00h
            bound edx, dword ptr [edi+44h]
            inc esp
            adc al, 15h
            inc ebp
            inc eax
            inc ecx
            lds eax, fword ptr [esi+11h]
            mov al, 8Bh
            fcomp dword ptr [ebx]
            mov cl, F7h
            div byte ptr [esi-068D2D60h]
            int F3h
            xor eax, 9BB33BBBh
            mov ebp, CFDF2C10h
            push ecx
            out C1h, eax
            in eax, E6h
            cmpsw
            mov esp, 79AF35E6h
            mov ebp, BD7AF35Eh
            out B8h, al
            shl dword ptr [edi+2Bh], cl
            and dword ptr [ebp+51h], eax
            retn D3ECh
            shl byte ptr [eax-01EAD4D8h], 1
            scasd
            mov bh, B2h
            jmp 00007F6055150821h
            rcr eax, cl
            daa
            cmpsd
            test eax, E645651Ch
            imul ebp, dword ptr [ebp+57h], AAh
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x2f940x4f.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x14c0000x56c.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x14e0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x2f780x1c.text
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x14815c0x148200False0.9945498511904762data7.998830102245729IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0x14c0000x56c0x600False0.4010416666666667data3.94255191885509IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x14e0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_VERSION0x14c0900x2dcdata
            RT_MANIFEST0x14c37c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
            DLLImport
            mscoree.dll_CorExeMain
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.48.8.8.858565532834936 02/05/23-22:13:01.009276UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5856553192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364969650802025019 02/05/23-22:12:42.607812TCP2025019ET TROJAN Possible NanoCore C2 60B496965080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364969850802816766 02/05/23-22:12:55.969019TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496985080192.168.2.4185.81.157.236
            192.168.2.48.8.8.852239532834936 02/05/23-22:13:07.004800UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5223953192.168.2.48.8.8.8
            192.168.2.48.8.8.859683532834936 02/05/23-22:12:48.706302UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5968353192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970250802816766 02/05/23-22:13:21.381361TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497025080192.168.2.4185.81.157.236
            192.168.2.48.8.8.855570532834936 02/05/23-22:13:46.917410UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5557053192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970350802025019 02/05/23-22:13:26.785835TCP2025019ET TROJAN Possible NanoCore C2 60B497035080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970750802025019 02/05/23-22:13:53.371030TCP2025019ET TROJAN Possible NanoCore C2 60B497075080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970850802816766 02/05/23-22:14:01.617464TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497085080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364969550802816766 02/05/23-22:12:36.467761TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496955080192.168.2.4185.81.157.236
            192.168.2.48.8.8.856807532834936 02/05/23-22:13:13.564883UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5680753192.168.2.48.8.8.8
            192.168.2.48.8.8.859446532834936 02/05/23-22:14:00.808827UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5944653192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970850802025019 02/05/23-22:14:01.155093TCP2025019ET TROJAN Possible NanoCore C2 60B497085080192.168.2.4185.81.157.236
            192.168.2.48.8.8.860686532834936 02/05/23-22:13:26.675466UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)6068653192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970150802025019 02/05/23-22:13:13.802670TCP2025019ET TROJAN Possible NanoCore C2 60B497015080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364969550802025019 02/05/23-22:12:34.327373TCP2025019ET TROJAN Possible NanoCore C2 60B496955080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364969950802025019 02/05/23-22:13:01.066179TCP2025019ET TROJAN Possible NanoCore C2 60B496995080192.168.2.4185.81.157.236
            185.81.157.236192.168.2.45080496982810290 02/05/23-22:12:55.383837TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1508049698185.81.157.236192.168.2.4
            192.168.2.48.8.8.861124532834936 02/05/23-22:13:33.702804UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)6112453192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970050802025019 02/05/23-22:13:07.182076TCP2025019ET TROJAN Possible NanoCore C2 60B497005080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970350802816766 02/05/23-22:13:28.533812TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497035080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970150802816718 02/05/23-22:13:14.238501TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497015080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970450802025019 02/05/23-22:13:33.759288TCP2025019ET TROJAN Possible NanoCore C2 60B497045080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970750802816766 02/05/23-22:13:55.082898TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497075080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970250802025019 02/05/23-22:13:20.465789TCP2025019ET TROJAN Possible NanoCore C2 60B497025080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970050802816766 02/05/23-22:13:08.202184TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497005080192.168.2.4185.81.157.236
            192.168.2.48.8.8.850911532834936 02/05/23-22:12:42.244175UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5091153192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364969850802025019 02/05/23-22:12:54.927420TCP2025019ET TROJAN Possible NanoCore C2 60B496985080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364969650802816766 02/05/23-22:12:43.716857TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496965080192.168.2.4185.81.157.236
            192.168.2.48.8.8.856572532834936 02/05/23-22:12:33.158126UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5657253192.168.2.48.8.8.8
            185.81.157.236192.168.2.45080496982841753 02/05/23-22:12:59.968145TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)508049698185.81.157.236192.168.2.4
            192.168.2.4185.81.157.2364969950802816766 02/05/23-22:13:02.138518TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496995080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970550802025019 02/05/23-22:13:40.652150TCP2025019ET TROJAN Possible NanoCore C2 60B497055080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970450802816766 02/05/23-22:13:34.738607TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497045080192.168.2.4185.81.157.236
            192.168.2.48.8.8.861007532834936 02/05/23-22:13:20.247193UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)6100753192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970650802816766 02/05/23-22:13:47.957729TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497065080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364970150802816766 02/05/23-22:13:15.190241TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497015080192.168.2.4185.81.157.236
            192.168.2.4185.81.157.2364969750802816766 02/05/23-22:12:49.673877TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496975080192.168.2.4185.81.157.236
            192.168.2.48.8.8.864906532834936 02/05/23-22:13:53.251157UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)6490653192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364969750802025019 02/05/23-22:12:48.883083TCP2025019ET TROJAN Possible NanoCore C2 60B496975080192.168.2.4185.81.157.236
            192.168.2.48.8.8.859444532834936 02/05/23-22:13:40.377957UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)5944453192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970550802816766 02/05/23-22:13:41.829847TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497055080192.168.2.4185.81.157.236
            192.168.2.48.8.8.864167532834936 02/05/23-22:12:54.870549UDP2834936ETPRO TROJAN Observed DNS Query to Abused DDNS (ddnsgeek .com)6416753192.168.2.48.8.8.8
            192.168.2.4185.81.157.2364970650802025019 02/05/23-22:13:46.971431TCP2025019ET TROJAN Possible NanoCore C2 60B497065080192.168.2.4185.81.157.236
            TimestampSource PortDest PortSource IPDest IP
            Feb 5, 2023 22:12:33.382641077 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:33.415704966 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:33.415920019 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:34.327373028 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:34.364419937 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:34.364609003 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:34.457401037 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:34.476407051 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:34.509838104 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:34.560023069 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.393512964 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.468734980 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.470374107 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.549987078 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.570312977 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.570358992 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.570386887 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.570415020 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.570554018 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.603595972 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603631973 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603657961 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603682041 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603708029 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603729010 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.603734970 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603729010 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.603763103 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603791952 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.603792906 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.603843927 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.637763977 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637797117 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637823105 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637846947 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637871027 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637896061 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637922049 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637923002 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.637923002 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.637947083 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637972116 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.637994051 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.637994051 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.637996912 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.638024092 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.638046980 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.638050079 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.638072968 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.638096094 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.638117075 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.638124943 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.638143063 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.638154030 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.638192892 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671045065 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671080112 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671106100 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671139956 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671165943 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671189070 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671216011 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671215057 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671215057 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671241999 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671278000 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671289921 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671289921 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671320915 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671346903 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671370029 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671370983 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671399117 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671413898 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671423912 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671448946 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671466112 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671473980 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671500921 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671534061 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671544075 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671571016 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671590090 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671595097 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671622038 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671638012 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671653986 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671679974 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671695948 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671706915 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671734095 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671749115 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671758890 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671783924 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671802998 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671809912 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671837091 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671866894 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671880960 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671907902 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671924114 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.671933889 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.671983957 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.704895020 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.704933882 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.704957962 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.704982996 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705018997 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705046892 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705059052 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705059052 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705074072 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705099106 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705121994 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705125093 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705142975 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705152988 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705178976 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705197096 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705204964 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705231905 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705245972 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705257893 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705284119 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705300093 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705312014 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705337048 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705360889 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705367088 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705387115 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705401897 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705414057 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705440998 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705466032 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705496073 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705543041 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705555916 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705591917 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705616951 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705632925 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705641985 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705673933 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705696106 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705698967 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705724955 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705739021 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705749989 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705775976 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705790997 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705801010 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705825090 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705840111 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705848932 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705876112 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705888033 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705902100 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705925941 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705941916 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.705951929 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705979109 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.705991030 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.706005096 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706031084 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706046104 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.706056118 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706080914 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706104040 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706104040 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.706130028 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706145048 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.706154108 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706178904 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706196070 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.706203938 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706229925 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706267118 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.706280947 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.706326962 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.738945961 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739025116 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739059925 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739085913 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739109993 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739137888 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739141941 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739137888 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739167929 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739197016 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739197969 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739223957 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739248037 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739248991 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739275932 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739291906 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739303112 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739327908 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739341974 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739353895 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739379883 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739392996 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739408016 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739433050 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739448071 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739459038 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739485979 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739500999 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739511013 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739537001 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739550114 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739562988 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739588976 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739599943 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739614964 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739639997 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739671946 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739694118 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739728928 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739737034 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739756107 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739783049 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739794016 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739818096 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739845991 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739865065 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739876032 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739902020 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739918947 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739926100 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739949942 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.739964962 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.739974976 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740001917 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740015984 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.740031004 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740056038 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740071058 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.740081072 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740108013 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740123987 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.740144014 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740170002 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740184069 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.740196943 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740233898 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740257025 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.740257978 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740283012 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740299940 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.740309000 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740334034 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740351915 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.740360975 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.740403891 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773341894 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773394108 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773417950 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773443937 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773472071 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773498058 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773525000 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773534060 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773534060 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773534060 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773550987 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773578882 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773606062 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773607016 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773637056 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773648024 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773664951 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773691893 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773705959 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773718119 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773756027 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773767948 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773785114 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773813963 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773828030 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773840904 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773868084 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773881912 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773894072 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773921013 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773932934 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.773947954 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773974895 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.773999929 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774027109 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774065018 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774077892 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774091005 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774127007 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774135113 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774153948 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774180889 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774195910 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774207115 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774235010 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774247885 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774260044 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774286032 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774301052 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774312019 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774338961 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774353981 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774363995 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774390936 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774405003 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774416924 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774444103 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774467945 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774471045 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774497032 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774513006 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774523973 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774550915 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774564028 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774576902 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774605036 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774621010 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774633884 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774679899 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774705887 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774744987 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774771929 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774790049 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.774804115 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.774852991 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.807732105 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807768106 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807792902 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807816982 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807841063 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807866096 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807889938 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807888031 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.807888031 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.807914972 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807943106 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807956934 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.807956934 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.807967901 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.807995081 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808037996 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808052063 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808087111 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808098078 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808111906 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808156013 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808176041 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808201075 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808243990 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808263063 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808281898 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808307886 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808321953 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808332920 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808357954 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808372974 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808382988 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808408022 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808420897 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808433056 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808459044 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808474064 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808485031 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808511972 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808526039 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808537006 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808562994 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808578968 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808588982 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808618069 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808631897 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808665991 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808698893 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808710098 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808726072 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808751106 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808769941 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808784008 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808811903 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808837891 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808845997 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808866024 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808881044 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808892965 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808919907 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808933020 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.808943987 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808970928 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.808988094 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809015989 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809045076 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809060097 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809077024 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809103966 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809127092 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809149981 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809181929 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809205055 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809206963 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809235096 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809267998 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809290886 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809319019 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809339046 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809350014 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809380054 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809395075 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809406042 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809433937 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809447050 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809467077 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809492111 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809513092 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809518099 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809545994 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809561968 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809571981 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809600115 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809613943 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809626102 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809652090 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809669018 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809678078 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809704065 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809720993 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809730053 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809756041 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809772968 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809782982 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809812069 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809823990 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809837103 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809863091 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809880018 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.809890032 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809911966 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:35.809935093 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:35.856981993 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:36.467761040 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:36.555270910 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:37.156367064 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:37.243690968 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:37.316512108 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:37.450824976 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:37.483881950 CET508049695185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:37.504720926 CET496955080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.572110891 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.605088949 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:42.605268002 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.607811928 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.646173954 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:42.647952080 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.681041956 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:42.707570076 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.798422098 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:42.859947920 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:42.864592075 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.897524118 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:42.927321911 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.960539103 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:42.960766077 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:42.994153976 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:43.045073986 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:43.276485920 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:43.370824099 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:43.370951891 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:43.450834036 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:43.716856956 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:43.815443039 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:44.550232887 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:44.629807949 CET508049696185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:44.655561924 CET496965080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:48.849288940 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:48.882442951 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:48.882559061 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:48.883083105 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:48.921649933 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:48.921953917 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:48.955208063 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:48.963589907 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:49.052500963 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:49.126878023 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:49.127686024 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:49.160753965 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:49.161895037 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:49.195107937 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:49.195215940 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:49.228461981 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:49.279930115 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:49.673877001 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:49.760862112 CET508049697185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:50.824850082 CET496975080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:54.891769886 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:54.924448013 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:54.926917076 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:54.927419901 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:54.967257023 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:54.969041109 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:55.001918077 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:55.002201080 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:55.103447914 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:55.103579044 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:55.203318119 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:55.244081974 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:55.284116983 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:55.316962957 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:55.317847967 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:55.350879908 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:55.351093054 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:55.383836985 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:55.514967918 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:55.969018936 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:56.055821896 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:56.968462944 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:12:59.968144894 CET508049698185.81.157.236192.168.2.4
            Feb 5, 2023 22:12:59.968274117 CET496985080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.031160116 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.064424038 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.065469980 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.066179037 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.104737043 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.115374088 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.149880886 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.202846050 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.280864954 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.357812881 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.448510885 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.454072952 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.487360001 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.489830017 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.523441076 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.523566008 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:01.557029009 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:01.609194040 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:02.138518095 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:02.231971025 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:02.533210993 CET508049699185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:02.578049898 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:02.977060080 CET496995080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.148288965 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.181394100 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.181499004 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.182075977 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.220442057 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.221782923 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.255911112 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.265765905 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.349011898 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.419994116 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.421005964 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.455277920 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.456147909 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.489711046 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.489841938 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:07.523161888 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:07.578344107 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:08.202183962 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:08.288276911 CET508049700185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:09.536371946 CET497005080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:13.765964031 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:13.798835993 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:13.802145004 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:13.802670002 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:13.840825081 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:13.842699051 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:13.875579119 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:13.888735056 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:13.964051962 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:14.045680046 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:14.047278881 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:14.079709053 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:14.081732035 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:14.114471912 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:14.116936922 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:14.149602890 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:14.152987003 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:14.237390041 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:14.238501072 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:14.317420959 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:15.190241098 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:15.289038897 CET508049701185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:16.189913988 CET497015080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.426532984 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.460441113 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.463074923 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.465789080 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.504157066 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.507392883 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.540591002 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.550985098 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.635417938 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.710206985 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.751302958 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.760224104 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.784410954 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.829489946 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.859173059 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.859260082 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.892425060 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:20.938817978 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:20.971827030 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:21.016974926 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:21.278027058 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:21.365154028 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:21.381361008 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:21.467243910 CET508049702185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:22.653599977 CET497025080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:26.697273016 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:26.731620073 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:26.732153893 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:26.785835028 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:26.824615955 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:26.827075958 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:26.859966993 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:26.908078909 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:26.915710926 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:26.991786003 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:27.073147058 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:27.078341007 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:27.112935066 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:27.117264032 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:27.152654886 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:27.155699015 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:27.190320969 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:27.236262083 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:27.540205002 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:27.626666069 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:28.533812046 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:28.614098072 CET508049703185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:29.561822891 CET497035080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:33.725107908 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:33.758358002 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:33.758553982 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:33.759288073 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:33.799480915 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:33.799746037 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:33.833126068 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:33.842880011 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:33.924288034 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:34.025516987 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:34.026376009 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:34.061079979 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:34.075555086 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:34.111661911 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:34.111804962 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:34.147957087 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:34.189956903 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:34.653119087 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:34.705687046 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:34.738606930 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:34.823585987 CET508049704185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:35.722256899 CET497045080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.594877005 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.628144979 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:40.628271103 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.652149916 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.690810919 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:40.691131115 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.724350929 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:40.738033056 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.824398041 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:40.827621937 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.894556046 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:40.895436049 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.928275108 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:40.929043055 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.962373972 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:40.962513924 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:40.995579958 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:41.049906969 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:41.829847097 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:41.918634892 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:42.703579903 CET508049705185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:42.753209114 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:42.891860962 CET497055080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:46.937424898 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:46.970738888 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:46.970993042 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:46.971431017 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:47.010767937 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:47.011148930 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:47.044526100 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:47.052253962 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:47.132530928 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:47.223341942 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:47.224592924 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:47.257715940 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:47.258765936 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:47.292031050 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:47.292161942 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:47.327442884 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:47.378513098 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:47.957729101 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:48.050895929 CET508049706185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:49.037152052 CET497065080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.335163116 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.367995024 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.368109941 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.371030092 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.408638000 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.428280115 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.461266994 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.504019022 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.552114010 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.638508081 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.710020065 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.754041910 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.779504061 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.786926985 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.832393885 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.858500957 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.858598948 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.891694069 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:53.941540003 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:53.974332094 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:54.019726038 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:54.067627907 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:54.153403044 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:55.082897902 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:13:55.161259890 CET508049707185.81.157.236192.168.2.4
            Feb 5, 2023 22:13:56.145503044 CET497075080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.028206110 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.061233044 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:01.065242052 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.155092955 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.194160938 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:01.237660885 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.242541075 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.275535107 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:01.315820932 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.529416084 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.617338896 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:01.617464066 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.697112083 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:01.704050064 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:01.817284107 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.850191116 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:01.857019901 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:01.940085888 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:03.050784111 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:03.083966970 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:03.137468100 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:04.540910006 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:04.542819977 CET497085080192.168.2.4185.81.157.236
            Feb 5, 2023 22:14:04.574131012 CET508049708185.81.157.236192.168.2.4
            Feb 5, 2023 22:14:04.593862057 CET497085080192.168.2.4185.81.157.236
            TimestampSource PortDest PortSource IPDest IP
            Feb 5, 2023 22:12:33.158126116 CET5657253192.168.2.48.8.8.8
            Feb 5, 2023 22:12:33.335684061 CET53565728.8.8.8192.168.2.4
            Feb 5, 2023 22:12:42.244174957 CET5091153192.168.2.48.8.8.8
            Feb 5, 2023 22:12:42.421756983 CET53509118.8.8.8192.168.2.4
            Feb 5, 2023 22:12:48.706301928 CET5968353192.168.2.48.8.8.8
            Feb 5, 2023 22:12:48.843491077 CET53596838.8.8.8192.168.2.4
            Feb 5, 2023 22:12:54.870548964 CET6416753192.168.2.48.8.8.8
            Feb 5, 2023 22:12:54.890508890 CET53641678.8.8.8192.168.2.4
            Feb 5, 2023 22:13:01.009275913 CET5856553192.168.2.48.8.8.8
            Feb 5, 2023 22:13:01.029556036 CET53585658.8.8.8192.168.2.4
            Feb 5, 2023 22:13:07.004800081 CET5223953192.168.2.48.8.8.8
            Feb 5, 2023 22:13:07.146991968 CET53522398.8.8.8192.168.2.4
            Feb 5, 2023 22:13:13.564882994 CET5680753192.168.2.48.8.8.8
            Feb 5, 2023 22:13:13.739322901 CET53568078.8.8.8192.168.2.4
            Feb 5, 2023 22:13:20.247193098 CET6100753192.168.2.48.8.8.8
            Feb 5, 2023 22:13:20.418184996 CET53610078.8.8.8192.168.2.4
            Feb 5, 2023 22:13:26.675466061 CET6068653192.168.2.48.8.8.8
            Feb 5, 2023 22:13:26.695624113 CET53606868.8.8.8192.168.2.4
            Feb 5, 2023 22:13:33.702804089 CET6112453192.168.2.48.8.8.8
            Feb 5, 2023 22:13:33.723865032 CET53611248.8.8.8192.168.2.4
            Feb 5, 2023 22:13:40.377957106 CET5944453192.168.2.48.8.8.8
            Feb 5, 2023 22:13:40.521933079 CET53594448.8.8.8192.168.2.4
            Feb 5, 2023 22:13:46.917409897 CET5557053192.168.2.48.8.8.8
            Feb 5, 2023 22:13:46.935590982 CET53555708.8.8.8192.168.2.4
            Feb 5, 2023 22:13:53.251157045 CET6490653192.168.2.48.8.8.8
            Feb 5, 2023 22:13:53.271231890 CET53649068.8.8.8192.168.2.4
            Feb 5, 2023 22:14:00.808826923 CET5944653192.168.2.48.8.8.8
            Feb 5, 2023 22:14:00.829329014 CET53594468.8.8.8192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Feb 5, 2023 22:12:33.158126116 CET192.168.2.48.8.8.80x6f9cStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:12:42.244174957 CET192.168.2.48.8.8.80x455bStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:12:48.706301928 CET192.168.2.48.8.8.80xcff3Standard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:12:54.870548964 CET192.168.2.48.8.8.80x2599Standard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:01.009275913 CET192.168.2.48.8.8.80xe949Standard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:07.004800081 CET192.168.2.48.8.8.80x3ddbStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:13.564882994 CET192.168.2.48.8.8.80xd97bStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:20.247193098 CET192.168.2.48.8.8.80x37e1Standard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:26.675466061 CET192.168.2.48.8.8.80x161cStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:33.702804089 CET192.168.2.48.8.8.80x611cStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:40.377957106 CET192.168.2.48.8.8.80x53acStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:46.917409897 CET192.168.2.48.8.8.80x5b7aStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:53.251157045 CET192.168.2.48.8.8.80xc6fStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            Feb 5, 2023 22:14:00.808826923 CET192.168.2.48.8.8.80xf7dbStandard query (0)rcontrol4sec.ddnsgeek.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Feb 5, 2023 22:12:33.335684061 CET8.8.8.8192.168.2.40x6f9cNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:12:42.421756983 CET8.8.8.8192.168.2.40x455bNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:12:48.843491077 CET8.8.8.8192.168.2.40xcff3No error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:12:54.890508890 CET8.8.8.8192.168.2.40x2599No error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:01.029556036 CET8.8.8.8192.168.2.40xe949No error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:07.146991968 CET8.8.8.8192.168.2.40x3ddbNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:13.739322901 CET8.8.8.8192.168.2.40xd97bNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:20.418184996 CET8.8.8.8192.168.2.40x37e1No error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:26.695624113 CET8.8.8.8192.168.2.40x161cNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:33.723865032 CET8.8.8.8192.168.2.40x611cNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:40.521933079 CET8.8.8.8192.168.2.40x53acNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:46.935590982 CET8.8.8.8192.168.2.40x5b7aNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:13:53.271231890 CET8.8.8.8192.168.2.40xc6fNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false
            Feb 5, 2023 22:14:00.829329014 CET8.8.8.8192.168.2.40xf7dbNo error (0)rcontrol4sec.ddnsgeek.com185.81.157.236A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:22:12:00
            Start date:05/02/2023
            Path:C:\Users\user\Desktop\WmtuqNHPM2.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\Desktop\WmtuqNHPM2.exe
            Imagebase:0xd50000
            File size:1346560 bytes
            MD5 hash:BBE4BA566D229A405DA3AF72193D297F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.361584928.000000000420D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.373170392.0000000005690000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: HKTL_NET_NAME_DotNetInject, Description: Detects .NET red/black-team tools via name, Source: 00000000.00000002.373707879.0000000005800000.00000004.08000000.00040000.00000000.sdmp, Author: Arnim Rupp
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.360372340.0000000003223000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.361584928.0000000004390000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.361584928.000000000442F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            Reputation:low

            Target ID:1
            Start time:22:12:06
            Start date:05/02/2023
            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
            Imagebase:0xbd0000
            File size:430592 bytes
            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Reputation:high

            Target ID:2
            Start time:22:12:06
            Start date:05/02/2023
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7c72c0000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:3
            Start time:22:12:29
            Start date:05/02/2023
            Path:C:\Users\user\Desktop\WmtuqNHPM2.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\Desktop\WmtuqNHPM2.exe
            Imagebase:0x760000
            File size:1346560 bytes
            MD5 hash:BBE4BA566D229A405DA3AF72193D297F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.573280284.0000000003BE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.576770822.0000000005380000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.576971415.00000000053B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579066865.0000000006D40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.573280284.0000000003ED6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.577664511.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579159635.0000000006D60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579551612.0000000006DC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.573280284.0000000003EBA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.577604617.0000000005630000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.567097554.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579206321.0000000006D70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.573280284.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.576714825.0000000005370000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579100921.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.576657661.00000000051E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579257158.0000000006D80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.577562971.0000000005620000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.563508459.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579396651.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.567097554.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            Reputation:low

            Reset < >

              Execution Graph

              Execution Coverage:12.4%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:0%
              Total number of Nodes:102
              Total number of Limit Nodes:8
              execution_graph 27613 1890c28 27614 1890c42 27613->27614 27615 1890c52 27614->27615 27617 1897bf0 27614->27617 27620 189e910 27617->27620 27622 189e937 27620->27622 27624 189ea18 27622->27624 27625 189ea61 VirtualProtect 27624->27625 27627 1891573 27625->27627 27628 57515c6 27629 57515d5 27628->27629 27633 5753118 27629->27633 27638 5753160 27629->27638 27630 57515fa 27635 575311b 27633->27635 27634 575313d 27634->27630 27635->27634 27636 57531eb SetThreadContext 27635->27636 27637 5753221 27636->27637 27637->27630 27639 57531a9 SetThreadContext 27638->27639 27641 5753221 27639->27641 27641->27630 27642 57502c0 27643 57502d2 27642->27643 27652 5753480 27643->27652 27656 5753488 27643->27656 27660 5753442 27643->27660 27644 5751184 27646 575026d 27646->27644 27665 5753750 27646->27665 27669 5753746 27646->27669 27653 57534d4 WriteProcessMemory 27652->27653 27655 575356d 27653->27655 27655->27646 27657 57534d4 WriteProcessMemory 27656->27657 27659 575356d 27657->27659 27659->27646 27661 57534b3 WriteProcessMemory 27660->27661 27662 575344b 27660->27662 27664 575356d 27661->27664 27662->27646 27664->27646 27666 57537d7 CreateProcessA 27665->27666 27668 5753a2c 27666->27668 27668->27668 27670 5753750 CreateProcessA 27669->27670 27672 5753a2c 27670->27672 27672->27672 27688 5750a20 27689 5750a2f 27688->27689 27694 5753160 SetThreadContext 27689->27694 27695 5753118 SetThreadContext 27689->27695 27690 5750ca2 27691 5750a54 27691->27690 27696 189ecd8 27691->27696 27694->27691 27695->27691 27697 189ed1c ResumeThread 27696->27697 27699 189ed68 27697->27699 27673 5750cb3 27674 5750cc2 27673->27674 27676 5753480 WriteProcessMemory 27674->27676 27677 5753442 WriteProcessMemory 27674->27677 27678 5753488 WriteProcessMemory 27674->27678 27675 5750cfe 27676->27675 27677->27675 27678->27675 27700 5751623 27701 5751632 27700->27701 27709 5754010 27701->27709 27715 5754020 27701->27715 27720 5753fd0 27701->27720 27702 5751020 27703 575026d 27704 5753746 CreateProcessA 27703->27704 27705 5753750 CreateProcessA 27703->27705 27704->27702 27705->27702 27710 5754083 27709->27710 27711 575401b 27709->27711 27710->27703 27726 5753330 27711->27726 27730 575332a 27711->27730 27712 5754054 27712->27703 27716 5754035 27715->27716 27718 5753330 VirtualAllocEx 27716->27718 27719 575332a VirtualAllocEx 27716->27719 27717 5754054 27717->27703 27718->27717 27719->27717 27721 575403b 27720->27721 27722 5753fd3 27720->27722 27724 5753330 VirtualAllocEx 27721->27724 27725 575332a VirtualAllocEx 27721->27725 27722->27703 27723 5754053 27723->27703 27724->27723 27725->27723 27727 5753374 VirtualAllocEx 27726->27727 27729 57533ec 27727->27729 27729->27712 27731 5753374 VirtualAllocEx 27730->27731 27733 57533ec 27731->27733 27733->27712 27602 57543f8 27603 5754441 RtlDecodePointer 27602->27603 27606 5754663 27602->27606 27604 5754475 27603->27604 27605 575447c RtlDecodePointer 27603->27605 27604->27605 27612 57544ba 27605->27612 27607 57544f3 RtlEncodePointer 27607->27612 27608 575453f RtlDecodePointer 27609 5754576 RtlEncodePointer 27608->27609 27608->27612 27609->27612 27610 57545c1 RtlDecodePointer 27611 57545fc RtlDecodePointer 27610->27611 27610->27612 27611->27612 27612->27606 27612->27607 27612->27608 27612->27609 27612->27610 27612->27611 27679 57514bb 27680 57514e9 27679->27680 27685 5753480 WriteProcessMemory 27680->27685 27686 5753442 WriteProcessMemory 27680->27686 27687 5753488 WriteProcessMemory 27680->27687 27681 575026d 27683 5753746 CreateProcessA 27681->27683 27684 5753750 CreateProcessA 27681->27684 27682 5751020 27683->27682 27684->27682 27685->27681 27686->27681 27687->27681

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 79 57c1278-57c12b6 80 57c12bd-57c13dc 79->80 81 57c12b8 79->81 84 57c13de-57c13f4 80->84 85 57c1400-57c140c 80->85 81->80 362 57c13fa call 57c3e18 84->362 363 57c13fa call 57c3e09 84->363 86 57c140e 85->86 87 57c1413-57c1418 85->87 86->87 89 57c141a-57c1426 87->89 90 57c1450-57c1499 87->90 91 57c142d-57c144b 89->91 92 57c1428 89->92 98 57c149b 90->98 99 57c14a0-57c1765 90->99 93 57c2bb4-57c2bba 91->93 92->91 95 57c2bbc-57c2bdc 93->95 96 57c2be5 93->96 95->96 98->99 125 57c2195-57c21a1 99->125 126 57c176a-57c1776 125->126 127 57c21a7-57c21df 125->127 128 57c177d-57c18a2 126->128 129 57c1778 126->129 136 57c22b9-57c22bf 127->136 163 57c18a4-57c18dc 128->163 164 57c18e2-57c196b 128->164 129->128 137 57c21e4-57c2261 136->137 138 57c22c5-57c22fd 136->138 153 57c2294-57c22b6 137->153 154 57c2263-57c2267 137->154 148 57c265b-57c2661 138->148 150 57c2667-57c26af 148->150 151 57c2302-57c2504 148->151 160 57c272a-57c2775 150->160 161 57c26b1-57c2724 150->161 245 57c250a-57c259e 151->245 246 57c25a3-57c25a7 151->246 153->136 154->153 158 57c2269-57c2291 154->158 158->153 183 57c2b7e-57c2b84 160->183 161->160 163->164 190 57c196d-57c1975 164->190 191 57c197a-57c19fe 164->191 185 57c277a 183->185 186 57c2b8a-57c2bb2 183->186 192 57c2784-57c27fc 185->192 186->93 194 57c2186-57c2192 190->194 221 57c1a0d-57c1a91 191->221 222 57c1a00-57c1a08 191->222 204 57c27fe-57c2819 192->204 205 57c2824-57c2830 192->205 194->125 204->205 207 57c2837-57c2843 205->207 208 57c2832 205->208 212 57c2845-57c2851 207->212 213 57c2856-57c2865 207->213 208->207 215 57c2b65-57c2b7b 212->215 216 57c286e-57c2b46 213->216 217 57c2867 213->217 215->183 248 57c2b51-57c2b5d 216->248 217->216 223 57c29cd-57c2a36 217->223 224 57c295f-57c29c8 217->224 225 57c2a3b-57c2aa3 217->225 226 57c2874-57c28dd 217->226 227 57c28e2-57c295a 217->227 268 57c1aa0-57c1b24 221->268 269 57c1a93-57c1a9b 221->269 222->194 223->248 224->248 256 57c2b17-57c2b1d 225->256 226->248 227->248 270 57c2642-57c2658 245->270 251 57c25a9-57c2602 246->251 252 57c2604-57c2641 246->252 248->215 251->270 252->270 261 57c2b1f-57c2b29 256->261 262 57c2aa5-57c2b03 256->262 261->248 275 57c2b0a-57c2b14 262->275 276 57c2b05 262->276 283 57c1b26-57c1b2e 268->283 284 57c1b33-57c1bb7 268->284 269->194 270->148 275->256 276->275 283->194 290 57c1bb9-57c1bc1 284->290 291 57c1bc6-57c1c4a 284->291 290->194 297 57c1c4c-57c1c54 291->297 298 57c1c59-57c1cdd 291->298 297->194 304 57c1cec-57c1d70 298->304 305 57c1cdf-57c1ce7 298->305 311 57c1d7f-57c1e03 304->311 312 57c1d72-57c1d7a 304->312 305->194 318 57c1e05-57c1e0d 311->318 319 57c1e12-57c1e96 311->319 312->194 318->194 325 57c1e98-57c1ea0 319->325 326 57c1ea5-57c1f29 319->326 325->194 332 57c1f38-57c1fbc 326->332 333 57c1f2b-57c1f33 326->333 339 57c1fbe-57c1fc6 332->339 340 57c1fcb-57c204f 332->340 333->194 339->194 346 57c205e-57c20e2 340->346 347 57c2051-57c2059 340->347 353 57c20e4-57c20ec 346->353 354 57c20f1-57c2175 346->354 347->194 353->194 360 57c2177-57c217f 354->360 361 57c2181-57c2183 354->361 360->194 361->194 362->85 363->85
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: 2
              • API String ID: 0-450215437
              • Opcode ID: 3584b32be89c4b10f11377174dc0bae6aad4ff24567edbcde4e38e1c59e3cbf7
              • Instruction ID: 1690fa9bd6a834192286b0b981920b5f26b48482a8dbed59f930e7a8c1880bed
              • Opcode Fuzzy Hash: 3584b32be89c4b10f11377174dc0bae6aad4ff24567edbcde4e38e1c59e3cbf7
              • Instruction Fuzzy Hash: 01E2D678A006698FCB64DF68D9947AEBBB6FB8C301F1081E9D909A7355DB305E81CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 493 57c9200-57c922b 494 57c922d 493->494 495 57c9232-57c92da 493->495 494->495 496 57c92e4-57c931a 495->496 497 57c931c 496->497 498 57c931f-57c932a 496->498 497->498 499 57c9760-57c9766 498->499 500 57c976c-57c9784 499->500 501 57c932f-57c9357 499->501 502 57c935e-57c9371 501->502 503 57c9359 501->503 505 57c9378-57c938c 502->505 506 57c9373 502->506 503->502 507 57c938e 505->507 508 57c9393-57c93a6 505->508 506->505 507->508 509 57c93ad-57c93cc 508->509 510 57c93a8 508->510 511 57c93ce-57c93d2 509->511 512 57c9420-57c9438 509->512 510->509 511->512 513 57c93d4-57c93e5 511->513 514 57c943f-57c9452 512->514 515 57c943a 512->515 516 57c9415-57c941b 513->516 517 57c9459-57c946d 514->517 518 57c9454 514->518 515->514 519 57c941d-57c941e 516->519 520 57c93e7-57c93eb 516->520 521 57c946f 517->521 522 57c9474-57c9487 517->522 518->517 523 57c9498-57c94cf 519->523 524 57c93ed 520->524 525 57c93f1-57c9403 520->525 521->522 526 57c948e-57c9495 522->526 527 57c9489 522->527 528 57c94da-57c95c1 523->528 529 57c94d1-57c94d7 523->529 524->525 530 57c940a-57c9412 525->530 531 57c9405 525->531 526->523 527->526 532 57c95cc-57c9664 528->532 533 57c95c3-57c95c9 528->533 529->528 530->516 531->530 535 57c96c8-57c96dd 532->535 536 57c9666-57c966a 532->536 533->532 538 57c96df 535->538 539 57c96e4-57c9705 535->539 536->535 537 57c966c-57c967b 536->537 540 57c96ba-57c96c0 537->540 538->539 541 57c970c-57c972b 539->541 542 57c9707 539->542 543 57c967d-57c9681 540->543 544 57c96c2-57c96c3 540->544 545 57c972d 541->545 546 57c9732-57c9752 541->546 542->541 548 57c968b-57c96ac 543->548 549 57c9683-57c9687 543->549 547 57c975d 544->547 545->546 550 57c9759 546->550 551 57c9754 546->551 547->499 552 57c96ae 548->552 553 57c96b3-57c96b7 548->553 549->548 550->547 551->550 552->553 553->540
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: UUUU
              • API String ID: 0-1798160573
              • Opcode ID: 3b035b9be18f3426c52f5a87757a8c4eb9e128273589b84abbe3c1aa70b3ecba
              • Instruction ID: 222315e926cce15888dfc133efc68ddcf652a72d4b0f7f8ad91b112d852d5c69
              • Opcode Fuzzy Hash: 3b035b9be18f3426c52f5a87757a8c4eb9e128273589b84abbe3c1aa70b3ecba
              • Instruction Fuzzy Hash: 7B12C271E046598FDB54CFAAC980A9DFBF2BF88304F28C169D518EB219D730A946CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: =T*l
              • API String ID: 0-1675597911
              • Opcode ID: 6cba726e2dd4e0617b72467d9f0430b970b4923b7ac3f8a8e3e097159dc8c0ff
              • Instruction ID: 60434d1dbe3a2369278c4691078f93631d6769e3fc988b395f57df7be92e2e24
              • Opcode Fuzzy Hash: 6cba726e2dd4e0617b72467d9f0430b970b4923b7ac3f8a8e3e097159dc8c0ff
              • Instruction Fuzzy Hash: 06312A74A011089FC744DF69E495AAD77F6FB99300F9490A9E41AEB351EF34AD41CF00
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9e12add332a5f9518fe40e727be7405642270d92bcf5ae348005a06cdb6b9b5d
              • Instruction ID: 07e50dba008a32be4b160d01ea94ce4fcaa5d3b063c6f86181a16f03869fe745
              • Opcode Fuzzy Hash: 9e12add332a5f9518fe40e727be7405642270d92bcf5ae348005a06cdb6b9b5d
              • Instruction Fuzzy Hash: E452B574A046298FCB64DF28C984BAABBB6FB48301F1085D9D90DA7355DB31AE81CF54
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9bbb586136e64a21dbf487bf6a77fa23e6df1bca78d1e7d6e9c9f895f3af0f99
              • Instruction ID: 5013b4f030e05b20e59063cd3fd189df0f10eb7b2180eb81813ddf0cbb91b936
              • Opcode Fuzzy Hash: 9bbb586136e64a21dbf487bf6a77fa23e6df1bca78d1e7d6e9c9f895f3af0f99
              • Instruction Fuzzy Hash: 88E1E674A052588FDF58DFA8D854BAEBBF6FB89304F10906AE509A7394CB345D82CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6184d2254eee7415e9bae887f2d79229b0902e49d0d6f051b62bde54bafa2190
              • Instruction ID: 34d11586fe7c6801b0d980d6fca50a8be36aca09e07e96b3b61661860422f130
              • Opcode Fuzzy Hash: 6184d2254eee7415e9bae887f2d79229b0902e49d0d6f051b62bde54bafa2190
              • Instruction Fuzzy Hash: A7D12974A052588FDF54DFA8D854BAEBBF6FB89300F10806AE509AB395CB345D82CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9ea8cf9771adee78253816300fec6a76369192098bb78853b111bfd2e9912be
              • Instruction ID: cb9119a7c1f78788491980ffc6685797379e701d2a1f435aaf444b7fee768e9b
              • Opcode Fuzzy Hash: f9ea8cf9771adee78253816300fec6a76369192098bb78853b111bfd2e9912be
              • Instruction Fuzzy Hash: FEC1E774A052588FDF54DFA8D854BAEBBF6FB49304F1090A9E509A7394CB345D82CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 91b747d781ba809b5447eda8733cb214538e509163cdb49295231e75f71c967a
              • Instruction ID: 51e630b5d85bff815e098c3602151ed0719c10f632c5958cb8f8254cc38917c1
              • Opcode Fuzzy Hash: 91b747d781ba809b5447eda8733cb214538e509163cdb49295231e75f71c967a
              • Instruction Fuzzy Hash: 4781D978A05218CFDB48DFA8D554AFEBBF6FB88300F10902AD509AB355DB74AD42CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9045b5d7948f8e6da1e241566a06300d0d702dcb38323eb468885c86d5368f7c
              • Instruction ID: d08c8d1164cef7c09b83ae8ed98d59defbf3ca0299965ab38bbc11fe4b81daf6
              • Opcode Fuzzy Hash: 9045b5d7948f8e6da1e241566a06300d0d702dcb38323eb468885c86d5368f7c
              • Instruction Fuzzy Hash: FE711874E04228DFDB18DFA5D854AAEBBF6FF89300F10806AD419AB355CB745986CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 56a0d900fad564bb4752012c46ad2ce64495685a2ac3e7960f82d2e0e6019b8e
              • Instruction ID: 4a10d8cb7bca7f753a8151ac26c28461c6f15543f3607639cd469861ec1e350b
              • Opcode Fuzzy Hash: 56a0d900fad564bb4752012c46ad2ce64495685a2ac3e7960f82d2e0e6019b8e
              • Instruction Fuzzy Hash: 4F712474E05209CFDB09CFA9D144AEEBBFAFF88304F15A0A9D804AB251D774A945CF61
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 656d3db427a1150d7fbe5408a9a71ef84ac4d7f231e9c748ac6ddfddbef59c2a
              • Instruction ID: 95f9e135d3d7e449f1feaff43e6d862afeb2cc668cb5c5feeda1493905899f3b
              • Opcode Fuzzy Hash: 656d3db427a1150d7fbe5408a9a71ef84ac4d7f231e9c748ac6ddfddbef59c2a
              • Instruction Fuzzy Hash: F8510374E05228DFDF18CFAAD954AAEBBF2BF89300F10C06AD459AB254DB741946CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 067dc807c01d3a015c79666ad236bbd787afb30d5acc726275d0dd6e0939e15f
              • Instruction ID: e81995ca10fbb1e80aa6a8ba92ea32659eb2dcad7311ddb6fe0d897b45995372
              • Opcode Fuzzy Hash: 067dc807c01d3a015c79666ad236bbd787afb30d5acc726275d0dd6e0939e15f
              • Instruction Fuzzy Hash: 6351E174E092098FDB05CFA9C144AEEBBF6FF8C304F15A0A9D804AB265D774A945CF51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bec5135e798be833bcede48f530ec71293cc46b1bf4882838af01a0aa30fe311
              • Instruction ID: 0e2e67a8e1db13d9fb2a241075fc7cd03021d40117d78ab1b76e8026bfc47024
              • Opcode Fuzzy Hash: bec5135e798be833bcede48f530ec71293cc46b1bf4882838af01a0aa30fe311
              • Instruction Fuzzy Hash: ED4168B5E016199BDB18CFABC94469EFBF3BFC8300F14C07AD918AB264EB3459458B54
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • RtlDecodePointer.NTDLL ref: 0575445F
              • RtlDecodePointer.NTDLL ref: 057544A4
              • RtlEncodePointer.NTDLL(00000000), ref: 0575450F
              • RtlDecodePointer.NTDLL(-000000FC), ref: 05754559
              • RtlEncodePointer.NTDLL(00000000), ref: 05754599
              • RtlDecodePointer.NTDLL ref: 057545DF
              • RtlDecodePointer.NTDLL ref: 05754623
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Pointer$Decode$Encode
              • String ID:
              • API String ID: 1638560559-0
              • Opcode ID: 3b8b34f47d8d1b584aef20c38d7f620d47a2057e0af6ac3cc01a15997d8f759e
              • Instruction ID: 418752ce24ef3e916ac563a2f2a1e4fa2e6d536967aee139581d60ff1ba6caf2
              • Opcode Fuzzy Hash: 3b8b34f47d8d1b584aef20c38d7f620d47a2057e0af6ac3cc01a15997d8f759e
              • Instruction Fuzzy Hash: A78115B5C05258DFCF21CFA9E18879CBFF6AB08324F24804AE809B7291D7B55984DF61
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 39 57543ea-575443b 41 5754441-5754473 RtlDecodePointer 39->41 42 5754689-57546a4 39->42 44 5754475-575447b 41->44 45 575447c-57544b8 RtlDecodePointer 41->45 44->45 46 57544c1-57544ce 45->46 47 57544ba-57544c0 45->47 49 57544d4-57544d8 46->49 50 5754663-5754686 46->50 47->46 49->50 53 57544de-57544e0 49->53 50->42 53->50 54 57544e6-57544e9 53->54 56 57544ec-57544f1 54->56 57 5754537-5754539 56->57 58 57544f3-5754523 RtlEncodePointer 56->58 57->50 62 575453f-575456d RtlDecodePointer 57->62 60 5754525-575452b 58->60 61 575452c-5754535 58->61 60->61 61->56 61->57 63 5754576-57545ad RtlEncodePointer 62->63 64 575456f-5754575 62->64 66 57545b6-57545f3 RtlDecodePointer 63->66 67 57545af-57545b5 63->67 64->63 71 57545f5-57545fb 66->71 72 57545fc-5754637 RtlDecodePointer 66->72 67->66 71->72 73 5754640-5754649 72->73 74 5754639-575463f 72->74 76 5754654-575465e 73->76 77 575464b-575464e 73->77 74->73 76->56 77->56 77->76
              APIs
              • RtlDecodePointer.NTDLL ref: 0575445F
              • RtlDecodePointer.NTDLL ref: 057544A4
              • RtlEncodePointer.NTDLL(00000000), ref: 0575450F
              • RtlDecodePointer.NTDLL(-000000FC), ref: 05754559
              • RtlEncodePointer.NTDLL(00000000), ref: 05754599
              • RtlDecodePointer.NTDLL ref: 057545DF
              • RtlDecodePointer.NTDLL ref: 05754623
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Pointer$Decode$Encode
              • String ID:
              • API String ID: 1638560559-0
              • Opcode ID: ca98ccc94622e053570a6c86ba5d42a9db07f36083b2cdd38044807d4cdf71df
              • Instruction ID: 7519e3f6e7837ed7611e1537f03a17d0d27683c3b6b5d3cca018aa8656f5ac65
              • Opcode Fuzzy Hash: ca98ccc94622e053570a6c86ba5d42a9db07f36083b2cdd38044807d4cdf71df
              • Instruction Fuzzy Hash: 747106B4C05258DFCB21CFA9E18879CBFF6AB18324F24814AE809B7391D7B55984DF61
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 364 5753746-57537e9 367 5753832-575385a 364->367 368 57537eb-5753802 364->368 371 57538a0-57538f6 367->371 372 575385c-5753870 367->372 368->367 373 5753804-5753809 368->373 380 575393c-5753a2a CreateProcessA 371->380 381 57538f8-575390c 371->381 372->371 382 5753872-5753877 372->382 374 575382c-575382f 373->374 375 575380b-5753815 373->375 374->367 377 5753817 375->377 378 5753819-5753828 375->378 377->378 378->378 383 575382a 378->383 401 5753a33-5753b18 380->401 402 5753a2c-5753a32 380->402 381->380 390 575390e-5753913 381->390 384 5753879-5753883 382->384 385 575389a-575389d 382->385 383->374 387 5753885 384->387 388 5753887-5753896 384->388 385->371 387->388 388->388 391 5753898 388->391 392 5753915-575391f 390->392 393 5753936-5753939 390->393 391->385 395 5753921 392->395 396 5753923-5753932 392->396 393->380 395->396 396->396 397 5753934 396->397 397->393 414 5753b28-5753b2c 401->414 415 5753b1a-5753b1e 401->415 402->401 417 5753b3c-5753b40 414->417 418 5753b2e-5753b32 414->418 415->414 416 5753b20 415->416 416->414 420 5753b50-5753b54 417->420 421 5753b42-5753b46 417->421 418->417 419 5753b34 418->419 419->417 423 5753b56-5753b7f 420->423 424 5753b8a-5753b95 420->424 421->420 422 5753b48 421->422 422->420 423->424 427 5753b96 424->427 427->427
              APIs
              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05753A17
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: 489e40389cc25e124b9c16aa5707301f2dabcacdb04a5b7759e455adf15be9b5
              • Instruction ID: 40bdff1538350c53440dad98d2ce47333fcca91d5a0d13fab08d6a06e14c20aa
              • Opcode Fuzzy Hash: 489e40389cc25e124b9c16aa5707301f2dabcacdb04a5b7759e455adf15be9b5
              • Instruction Fuzzy Hash: 3DC159B1D0025D8FDB24CFA8C844BEDBBB1BF44314F0095A9E859B7250DBB49A85DF94
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 429 5753750-57537e9 431 5753832-575385a 429->431 432 57537eb-5753802 429->432 435 57538a0-57538f6 431->435 436 575385c-5753870 431->436 432->431 437 5753804-5753809 432->437 444 575393c-5753a2a CreateProcessA 435->444 445 57538f8-575390c 435->445 436->435 446 5753872-5753877 436->446 438 575382c-575382f 437->438 439 575380b-5753815 437->439 438->431 441 5753817 439->441 442 5753819-5753828 439->442 441->442 442->442 447 575382a 442->447 465 5753a33-5753b18 444->465 466 5753a2c-5753a32 444->466 445->444 454 575390e-5753913 445->454 448 5753879-5753883 446->448 449 575389a-575389d 446->449 447->438 451 5753885 448->451 452 5753887-5753896 448->452 449->435 451->452 452->452 455 5753898 452->455 456 5753915-575391f 454->456 457 5753936-5753939 454->457 455->449 459 5753921 456->459 460 5753923-5753932 456->460 457->444 459->460 460->460 461 5753934 460->461 461->457 478 5753b28-5753b2c 465->478 479 5753b1a-5753b1e 465->479 466->465 481 5753b3c-5753b40 478->481 482 5753b2e-5753b32 478->482 479->478 480 5753b20 479->480 480->478 484 5753b50-5753b54 481->484 485 5753b42-5753b46 481->485 482->481 483 5753b34 482->483 483->481 487 5753b56-5753b7f 484->487 488 5753b8a-5753b95 484->488 485->484 486 5753b48 485->486 486->484 487->488 491 5753b96 488->491 491->491
              APIs
              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05753A17
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: 77fa34a9b484039c25951925cb5286b047fb5fbf55d51024b46c7c340b3d3161
              • Instruction ID: 1e4607d8ca8d7bc5d212a47f9cb3743104829f5e585b5788cf5dad1900ca749a
              • Opcode Fuzzy Hash: 77fa34a9b484039c25951925cb5286b047fb5fbf55d51024b46c7c340b3d3161
              • Instruction Fuzzy Hash: D6C159B1D0025D8FDB24CFA8C844BEDBBB1BF08314F0095A9E859B7250DBB49A85DF94
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 554 5a98790-5a987a2 555 5a987ca-5a987ce 554->555 556 5a987a4-5a987c3 554->556 557 5a987da-5a987e9 555->557 558 5a987d0-5a987d2 555->558 556->555 560 5a987eb 557->560 561 5a987f5-5a98821 557->561 650 5a987d4 call 5a98780 558->650 651 5a987d4 call 5a98790 558->651 560->561 564 5a98a42-5a98a87 561->564 565 5a98827-5a9882d 561->565 594 5a98a89 564->594 595 5a98a9d-5a98aa9 564->595 566 5a98833-5a98839 565->566 567 5a988f6-5a988fa 565->567 566->564 570 5a9883f-5a9884e 566->570 571 5a988fc-5a98905 567->571 572 5a9891f-5a98928 567->572 576 5a988d5-5a988de 570->576 577 5a98854-5a98860 570->577 571->564 573 5a9890b-5a9891d 571->573 574 5a9892a-5a9894a 572->574 575 5a9894d-5a98950 572->575 578 5a98953-5a98959 573->578 574->575 575->578 576->564 581 5a988e4-5a988f0 576->581 577->564 580 5a98866-5a9887d 577->580 578->564 585 5a9895f-5a98974 578->585 583 5a98889-5a9889b 580->583 584 5a9887f 580->584 581->566 581->567 583->576 593 5a9889d-5a988a3 583->593 584->583 585->564 587 5a9897a-5a9898c 585->587 587->564 589 5a98992-5a9899f 587->589 589->564 592 5a989a5-5a989bc 589->592 592->564 605 5a989c2-5a989da 592->605 596 5a988af-5a988b5 593->596 597 5a988a5 593->597 599 5a98a8c-5a98a8e 594->599 600 5a98aab 595->600 601 5a98ab5-5a98ad1 595->601 596->564 598 5a988bb-5a988d2 596->598 597->596 603 5a98a90-5a98a9b 599->603 604 5a98ad2-5a98b0f 599->604 600->601 603->595 603->599 615 5a98b2b-5a98b37 604->615 616 5a98b11-5a98b14 604->616 605->564 606 5a989dc-5a989e7 605->606 608 5a989e9-5a989f3 606->608 609 5a98a38-5a98a3f 606->609 608->609 614 5a989f5-5a98a0b 608->614 622 5a98a0d 614->622 623 5a98a17-5a98a30 614->623 618 5a98b39 615->618 619 5a98b43-5a98b68 615->619 617 5a98b17-5a98b29 616->617 617->615 617->617 618->619 626 5a98b6a-5a98b70 619->626 627 5a98bdc-5a98be2 619->627 622->623 623->609 626->627 628 5a98b72-5a98b75 626->628 630 5a98c2f-5a98c49 627->630 631 5a98be4-5a98be7 627->631 632 5a98b7b-5a98b88 628->632 633 5a98c4c-5a98c72 628->633 631->633 634 5a98be9-5a98bf6 631->634 638 5a98b8a-5a98bb4 632->638 639 5a98bd6-5a98bda 632->639 645 5a98c79-5a98c8b 633->645 646 5a98c74 633->646 635 5a98c29-5a98c2d 634->635 636 5a98bf8-5a98c10 634->636 635->630 635->631 636->633 640 5a98c12-5a98c25 636->640 641 5a98bc0-5a98bd3 638->641 642 5a98bb6 638->642 639->627 639->628 640->635 641->639 642->641 646->645 650->557 651->557
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: d
              • API String ID: 0-2564639436
              • Opcode ID: a8600517a753d41ee9a042303ca9b389bdd20d7303264176a2a5225ad17cf043
              • Instruction ID: be8303de2338bb4686f1bd1268aceaa3567bcea5cc6d46e3d13590fab9b62e8f
              • Opcode Fuzzy Hash: a8600517a753d41ee9a042303ca9b389bdd20d7303264176a2a5225ad17cf043
              • Instruction Fuzzy Hash: 2AF18A346006168FCB18CF29C484D6ABBF2FF89310B15C669D46A9B766DB34FC46CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 652 5753118-575313b 654 5753150-57531c0 652->654 655 575313d-575314b 652->655 660 57531d7-575321f SetThreadContext 654->660 661 57531c2-57531d4 654->661 663 5753221-5753227 660->663 664 5753228-5753274 660->664 661->660 663->664
              APIs
              • SetThreadContext.KERNELBASE(?,?), ref: 0575320F
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: ContextThread
              • String ID:
              • API String ID: 1591575202-0
              • Opcode ID: 421511246281baa401dbbb23f7ebbfaff251b8e16ec8d286b4d9360cc096e8f8
              • Instruction ID: 34d183f71e92aaa9144f56b754a88a721feb5a331fd42cab962460855a1b99a8
              • Opcode Fuzzy Hash: 421511246281baa401dbbb23f7ebbfaff251b8e16ec8d286b4d9360cc096e8f8
              • Instruction Fuzzy Hash: CE4153B5C042889FCB10CFA9D984AEEBFB0FF09364F14846AE804BB251D7789946CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 669 5753442-5753449 670 57534b3-57534f3 669->670 671 575344b-575345a 669->671 676 57534f5-5753507 670->676 677 575350a-575356b WriteProcessMemory 670->677 674 5753461-5753473 671->674 675 575345c 671->675 675->674 676->677 681 5753574-57535c6 677->681 682 575356d-5753573 677->682 682->681
              APIs
              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0575355B
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MemoryProcessWrite
              • String ID:
              • API String ID: 3559483778-0
              • Opcode ID: 1ecde675442980c1494f80e26cb3b3d84355d0a8eb6058e80eea6e90034e9f80
              • Instruction ID: e0d12ea86d8a640ca1b744d69f9d131bec4f99bbf79b53406bedee06c9c6f933
              • Opcode Fuzzy Hash: 1ecde675442980c1494f80e26cb3b3d84355d0a8eb6058e80eea6e90034e9f80
              • Instruction Fuzzy Hash: F84110B5D042488FCF01CFA9D884AEEBBF1BF49310F14A42AE815B7250D778AA45DF64
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 687 5753480-57534f3 689 57534f5-5753507 687->689 690 575350a-575356b WriteProcessMemory 687->690 689->690 692 5753574-57535c6 690->692 693 575356d-5753573 690->693 693->692
              APIs
              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0575355B
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MemoryProcessWrite
              • String ID:
              • API String ID: 3559483778-0
              • Opcode ID: 6156882074046294acf3e71619aecda0cb2dfb4519f80e78ab2c9694556d8d11
              • Instruction ID: afca36a59bd38ad2fad7c5c23275c182c1b3a17c9f0c0c6ddaa72d70553ae052
              • Opcode Fuzzy Hash: 6156882074046294acf3e71619aecda0cb2dfb4519f80e78ab2c9694556d8d11
              • Instruction Fuzzy Hash: 1D419AB5D012589FCF00CFA9D984AEEFBF1BB09314F14942AE819B7250D778AA45CF64
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 698 5753488-57534f3 700 57534f5-5753507 698->700 701 575350a-575356b WriteProcessMemory 698->701 700->701 703 5753574-57535c6 701->703 704 575356d-5753573 701->704 704->703
              APIs
              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0575355B
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MemoryProcessWrite
              • String ID:
              • API String ID: 3559483778-0
              • Opcode ID: dd55d1efa15d4c9eecedc9f956e7103f94a3039bde76f8cb8df97406dff04047
              • Instruction ID: c87799680b2b8d231c09a65e19826c9055833c8d11291be58c9ef02e0241422f
              • Opcode Fuzzy Hash: dd55d1efa15d4c9eecedc9f956e7103f94a3039bde76f8cb8df97406dff04047
              • Instruction Fuzzy Hash: E1419CB5D012589FCF00CFAAD984ADEFBF1BB49314F14942AE819B7210D774AA45CF64
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 709 5753330-57533ea VirtualAllocEx 712 57533f3-575343d 709->712 713 57533ec-57533f2 709->713 713->712
              APIs
              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 057533DA
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 041e0376124d59c060008d53ee8f7954e2e3a372fbda15b77845686230e1e1c1
              • Instruction ID: 3d5db38bc0adc95747c7fef1dfcf17abf880ea0832fe80e5092c56c8d5e75d46
              • Opcode Fuzzy Hash: 041e0376124d59c060008d53ee8f7954e2e3a372fbda15b77845686230e1e1c1
              • Instruction Fuzzy Hash: 3C3188B5D002589FCF10CFA9D980ADEBBB5FB59320F10942AE815B7210D775A946CF54
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 718 575332a-57533ea VirtualAllocEx 721 57533f3-575343d 718->721 722 57533ec-57533f2 718->722 722->721
              APIs
              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 057533DA
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: e1c7241b22f8e9608e6d5751f343caee27ed262028c88ca07573026833074350
              • Instruction ID: e81773831c0896dadefee496b5c71c1000be1762d7d4457736dc80988b6e671c
              • Opcode Fuzzy Hash: e1c7241b22f8e9608e6d5751f343caee27ed262028c88ca07573026833074350
              • Instruction Fuzzy Hash: C7318AB9D002589FCF10CFA9D980AEEBBB5BB19320F10942AE815B7210D775A945CF54
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 727 189ea18-189eacc VirtualProtect 730 189eace-189ead4 727->730 731 189ead5-189eb1d 727->731 730->731
              APIs
              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0189EABC
              Memory Dump Source
              • Source File: 00000000.00000002.360136077.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1890000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: ProtectVirtual
              • String ID:
              • API String ID: 544645111-0
              • Opcode ID: d65fb0b572d0d9b7ca78289ac70e173094b577164c708af2905d2d678f6538b7
              • Instruction ID: 4845197cb88d7aebb54dbf7b614ff53dfd6855eea8d6d865707599f640e4b93f
              • Opcode Fuzzy Hash: d65fb0b572d0d9b7ca78289ac70e173094b577164c708af2905d2d678f6538b7
              • Instruction Fuzzy Hash: C931A7B4D002589FCF10CFAAD884AEEFBB5FB59310F14902AE815B7210D738A945CFA4
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 736 5753160-57531c0 738 57531d7-575321f SetThreadContext 736->738 739 57531c2-57531d4 736->739 741 5753221-5753227 738->741 742 5753228-5753274 738->742 739->738 741->742
              APIs
              • SetThreadContext.KERNELBASE(?,?), ref: 0575320F
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: ContextThread
              • String ID:
              • API String ID: 1591575202-0
              • Opcode ID: 0933cf424564cd0b8fe164ceb85ccb5088f13c741de5d2f5d586bbd745c847e5
              • Instruction ID: 926e8c4870b4936c433bec48f649c7ec172a9d01c4aae0746fa4667a6ef49e0e
              • Opcode Fuzzy Hash: 0933cf424564cd0b8fe164ceb85ccb5088f13c741de5d2f5d586bbd745c847e5
              • Instruction Fuzzy Hash: 3F31BCB4D012589FCB10CFAAD884AEEBBF1FF49324F14842AE815B7250D778A945CF94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ResumeThread.KERNELBASE(?), ref: 0189ED56
              Memory Dump Source
              • Source File: 00000000.00000002.360136077.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1890000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: ResumeThread
              • String ID:
              • API String ID: 947044025-0
              • Opcode ID: 91ec29b54e15740933b2ec66e25fd75f21302176d67fe4dca72f42a0bb6a8f17
              • Instruction ID: 439a51d33ef01e5dffa07faa22211f8aa227dea83249c5febf0597e1f329fa31
              • Opcode Fuzzy Hash: 91ec29b54e15740933b2ec66e25fd75f21302176d67fe4dca72f42a0bb6a8f17
              • Instruction Fuzzy Hash: FA31ABB4D012589FCF14CFAAD884ADEFBB5AF49314F14942AE815B7310D734A941CF94
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: }
              • API String ID: 0-4239843852
              • Opcode ID: 050a430b43466e6a4e2a11a60159409dbb65610985a96af781b4e4e991ce7b40
              • Instruction ID: 249201fb91ce53729d366c579cd2caf5d754f429f7184970bc6b07048cecef3d
              • Opcode Fuzzy Hash: 050a430b43466e6a4e2a11a60159409dbb65610985a96af781b4e4e991ce7b40
              • Instruction Fuzzy Hash: 5D813474E05208CFDB14CFA8D899BADBBB6BB89300FA0906DE40DAB355DB749845DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: (
              • API String ID: 0-3887548279
              • Opcode ID: 8af873b61e23272e1947fd9cbbda9918e504c35752b01fbc571192d69c979949
              • Instruction ID: ef13ca2ca470a9b6e76e4fb5a4bc41906879841c8aee48f9c4ad10984a9b358f
              • Opcode Fuzzy Hash: 8af873b61e23272e1947fd9cbbda9918e504c35752b01fbc571192d69c979949
              • Instruction Fuzzy Hash: 4121E2789052688FDBA1CF68D558BF9BBB2FB99305F0050E9A80DA7385CB355E81CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: /
              • API String ID: 0-2043925204
              • Opcode ID: 265d846d961e2757d883e0c54862aac67c3b348336e21951cc908ea2e49cf194
              • Instruction ID: 5c86382541817da908cd7a3c8da3f983cb0823e77e528b62e553f165b8a89b5d
              • Opcode Fuzzy Hash: 265d846d961e2757d883e0c54862aac67c3b348336e21951cc908ea2e49cf194
              • Instruction Fuzzy Hash: 45D05E3000425CCBEB00CB90D40CBB9BF72F7C5306F04802C94072B184CB790C44EB14
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.360227865.00000000031B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_31b0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 41c217ae8641475de5640c6046d1b63285950150bf8a39b7a21b89e9b2954279
              • Instruction ID: 7fa29daa1bb6d9e260cb3f219e656e041b7277adf344d85b190ad48ee6a7a30d
              • Opcode Fuzzy Hash: 41c217ae8641475de5640c6046d1b63285950150bf8a39b7a21b89e9b2954279
              • Instruction Fuzzy Hash: BDC1D270909384AFCB16CB78CC58BEE7FB5EF0A300F1940DAE544AB2A6C3785945CB61
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 945abcac714e638c361d8ec073905b68cf2d51f8231108d4e2be3a90971736d3
              • Instruction ID: 782ebec614b16ba9d0ef53c8ce79dd645d3a998adeb3b9cb6edf56afc5b9ccc0
              • Opcode Fuzzy Hash: 945abcac714e638c361d8ec073905b68cf2d51f8231108d4e2be3a90971736d3
              • Instruction Fuzzy Hash: 05D1D378A04218CFDB54DFA8D954BAEBBF6FB88300F108169D909A7395DB346D81CF91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0e6ad69c91e4475602eb8680c33b55b68b873bda1ae2a397279dd3d44e41ff33
              • Instruction ID: bf1c1f289d107e7fbce48b9598576204c60e82a2f614dc48b768f4cdd0d92bf1
              • Opcode Fuzzy Hash: 0e6ad69c91e4475602eb8680c33b55b68b873bda1ae2a397279dd3d44e41ff33
              • Instruction Fuzzy Hash: D8D1E478A04218CFDB54DFA8D954BAEBBF6FB88300F108169D909A7395CB346D81CF91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3cbc5e07cae986fa631ce0ab7997d41732469a13becba9f038076ab27de7abc6
              • Instruction ID: 9071b7ce834d11c950be5bee2c10a7142f42cbd34b1413ead909dd2723499ef1
              • Opcode Fuzzy Hash: 3cbc5e07cae986fa631ce0ab7997d41732469a13becba9f038076ab27de7abc6
              • Instruction Fuzzy Hash: B6D1D578A04218CFDB54DFA8D554BAEBBF6FB88300F104169E909A7395CB74AD81CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0950e53e18860fcdf32aab98ff82a1348c28520ca20dff89ecada2556b3bd5cd
              • Instruction ID: a5510f399005f46c73c295e724f477da9974fbecc476bfc81db1424a0f1bb9b2
              • Opcode Fuzzy Hash: 0950e53e18860fcdf32aab98ff82a1348c28520ca20dff89ecada2556b3bd5cd
              • Instruction Fuzzy Hash: 11D1D478A04218CFDB54DFA8D954BAEBBF6FB88300F108169D909A7395CB746D81CF91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5f2431eb84b927e7eda4235a7df55d1880df0999200dddd09fc0acfca7882a68
              • Instruction ID: 503e4fff1b7c49c8ac2c495bb594f1cf3f35c53889153dfcbdc23dafcc9338ef
              • Opcode Fuzzy Hash: 5f2431eb84b927e7eda4235a7df55d1880df0999200dddd09fc0acfca7882a68
              • Instruction Fuzzy Hash: 19D1D478A04218CFDB54DFA8D554BAEBBF6FB88300F108169D909A7395CB746D81CF91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 584af65884b058719b8c1bd5953ddc7f249ee9de76bcde73d85b1ea6695c35ba
              • Instruction ID: cc89be8b93e80339b9fa10988f4113c4e3e0fa778f98e4e8821d28cc09eab9a2
              • Opcode Fuzzy Hash: 584af65884b058719b8c1bd5953ddc7f249ee9de76bcde73d85b1ea6695c35ba
              • Instruction Fuzzy Hash: 6AC1D378E002189FDB54DFA8D994AADBBF6FF88300F508169E909AB355DB306D85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c7f37e5e87350c79a6eefdd2a3993c9ba42a31c298c5899767bdf0ed6e5b3121
              • Instruction ID: e2e080739c06b650ab0d417d714f57b4ad4ea2b7e1d2b61900ee6e033b34d37d
              • Opcode Fuzzy Hash: c7f37e5e87350c79a6eefdd2a3993c9ba42a31c298c5899767bdf0ed6e5b3121
              • Instruction Fuzzy Hash: 7FB1D378E002189FDB54DFA8D994AADBBF6FF88300F508169E909AB355DB306D85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0915c85337740c9e45a17c362e43afaae07db8f049d89975e2befb65f3d0d574
              • Instruction ID: a5561d2223bc8b473b6e269195bc42657dcbce52a398430940a6da624fd49e62
              • Opcode Fuzzy Hash: 0915c85337740c9e45a17c362e43afaae07db8f049d89975e2befb65f3d0d574
              • Instruction Fuzzy Hash: 54812574E05208CFDB14CFA9D499BADBBB6BB89300FA0906DE80DAB355DB745845DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e0809b1ea7b4540a0563709462557913059b22293ff7682c3c925f06a58710d5
              • Instruction ID: 30bbf9093499016b27a3b15c3a1ed13d0fa58d285bb87f10078d3ee8c5d11fdf
              • Opcode Fuzzy Hash: e0809b1ea7b4540a0563709462557913059b22293ff7682c3c925f06a58710d5
              • Instruction Fuzzy Hash: 9F811474A09208CFCB10CFA8D499BADBBB6FB49300FA091ADE409AB355DB749D45DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2ce94b911cb46d3ab0a18687a082b4d1e223ef3da3a659f981d4adf96f10efe7
              • Instruction ID: 548950147b3cfdc1fd357c5e78992524164ec2db3879345079168ab16f5165ef
              • Opcode Fuzzy Hash: 2ce94b911cb46d3ab0a18687a082b4d1e223ef3da3a659f981d4adf96f10efe7
              • Instruction Fuzzy Hash: 82810474E04219CFDB04DFA8D954AEEBBF6FB89300F104029D905A7394DB74AD86CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8a2d35e90eaf3228be326f5849e42e2d8fb04b7d4331b0543c90a31e10f85710
              • Instruction ID: 73e4a326d3f7a5bfd98d8b5f13d45ff8049f93389e21e478fe70aaa225a41d07
              • Opcode Fuzzy Hash: 8a2d35e90eaf3228be326f5849e42e2d8fb04b7d4331b0543c90a31e10f85710
              • Instruction Fuzzy Hash: A481C474A00109DFCB49EFA4E498AADBBB2FF89340F508429D51AAB354CF756D06CF54
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0e8dfbf9e0d5e76e1302763fbd5a36e65d709efaf5cded101507093358cb377d
              • Instruction ID: 7c78b87a33f912127fb9256e3c1e0e75b4040aa8d8ad4c93040073960a0da034
              • Opcode Fuzzy Hash: 0e8dfbf9e0d5e76e1302763fbd5a36e65d709efaf5cded101507093358cb377d
              • Instruction Fuzzy Hash: D5811874A10259CFDB04DFA8D554AEEBBF2FF88304F509129E415A73A8DB746885CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 41973d8a2dd0b35e73fec3c995377cbbc28353b13278146e8ce01179c85e24f6
              • Instruction ID: 0b02ee2dcabfd8f6b7d62b547a1461ccf9a8d0f52a6424b1fc2242fc32692d43
              • Opcode Fuzzy Hash: 41973d8a2dd0b35e73fec3c995377cbbc28353b13278146e8ce01179c85e24f6
              • Instruction Fuzzy Hash: 5D810678E05258CFDB55DFA8C958BAEBBB6FF88300F1080A9D40AAB354DB345985CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c2ab51ae18cfa59e87bd00eb2b8de4b31484d7ec8680a1391895e8a00c795a03
              • Instruction ID: 711643626605a4be2152e8b524a6dd61dca01681b011104207d37fbcf3b55d1e
              • Opcode Fuzzy Hash: c2ab51ae18cfa59e87bd00eb2b8de4b31484d7ec8680a1391895e8a00c795a03
              • Instruction Fuzzy Hash: 14611974E00109EFCB49EBA8E498AADBBB3FF99340F508468D51AA7254CF752D01CF55
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c26e9f00623d1f173d0504ac8818ac46f9ba4d74510cafd338606158976eab4c
              • Instruction ID: e71b2b5656f71fba69d7f4ceb64f50a70df1414d5c5bf37667eaf1df1a9cdd31
              • Opcode Fuzzy Hash: c26e9f00623d1f173d0504ac8818ac46f9ba4d74510cafd338606158976eab4c
              • Instruction Fuzzy Hash: 06612A74A10159CFDB04DFA8D959AEEBBF2FF88304F408129E415A7398DB346886CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 505fd472ff2ea2c90af4e2f3b57ecd744281f49f4f3f9436ea06ee3e713b1d6e
              • Instruction ID: edef09d357088615a021abedd0c7019e5c580715c9140d0ae38b17d3ea6538aa
              • Opcode Fuzzy Hash: 505fd472ff2ea2c90af4e2f3b57ecd744281f49f4f3f9436ea06ee3e713b1d6e
              • Instruction Fuzzy Hash: E861B375E002299FDF04DFA9D584AEEFBF2FB88311F14802AE915A7354D734A945CB60
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4ae3f2857e0d9088786a8ded20afcf2668fb7cb34446ce05d23caaad8f5ae240
              • Instruction ID: a5b6dac57fde4214191672a7712ce0e79eb3e024b23d96c5d26abd7e041d6e8c
              • Opcode Fuzzy Hash: 4ae3f2857e0d9088786a8ded20afcf2668fb7cb34446ce05d23caaad8f5ae240
              • Instruction Fuzzy Hash: F461F778A05219CFDB44DFA8D595AEEBBF6FB88300F119026E509AB354DB34AD42CB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8308c288b809a13988f0af2d49ee2b5a6698f282bd1321ab16f764b5975d1380
              • Instruction ID: fed6bd1025793a8c7dbd68d63c5f42ddcd4f2f9e6f019aa61e9798a84723b4c9
              • Opcode Fuzzy Hash: 8308c288b809a13988f0af2d49ee2b5a6698f282bd1321ab16f764b5975d1380
              • Instruction Fuzzy Hash: 4151D774E10109EFCB49EBA4E498AADBBB3FF89340F508428E51AA7254CF752D01CF55
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cbee056ebfd279f362b6ecfedafe1765d3c143f0755b7a462e08a322222b4b32
              • Instruction ID: 07308dd5cb0f8b21fff5e92c9e50af327cb1951a6c83f4f87acfcd6cc6e599ba
              • Opcode Fuzzy Hash: cbee056ebfd279f362b6ecfedafe1765d3c143f0755b7a462e08a322222b4b32
              • Instruction Fuzzy Hash: 71511679E00259CFDF04DFA8D954AEEBBB6FB88311F10402AD906AB394DB746D46CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 680944eea7af9a515a5469381894a2f87130e64644db314b5905a3e9121f44a8
              • Instruction ID: 5a3c05f8fd1952da797b40737d9487e52076f5d885f6e5db7bcde1b495c6d777
              • Opcode Fuzzy Hash: 680944eea7af9a515a5469381894a2f87130e64644db314b5905a3e9121f44a8
              • Instruction Fuzzy Hash: D061F878A05258CFDB54DF98D598BADBBB6FF8D300F1040A9D50AAB254CB346D85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: be44d4334a721dd269f4214f77433c7aff965828db1529248b681e86025ef785
              • Instruction ID: 109054f8740e58627056ff5c293f91385cd66a400d2a4cc9e06e3c5709e5b1af
              • Opcode Fuzzy Hash: be44d4334a721dd269f4214f77433c7aff965828db1529248b681e86025ef785
              • Instruction Fuzzy Hash: 1851C778E00249DFCB44DFA8D454AAEBBB2FF8C301F208069D805AB398DB356D85CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3cbd7cb6204493704c6b733bfbadc339532ca58f824ae1d0721fdf5d08ff1f7a
              • Instruction ID: 79998f9c32d096ace2debecdbcc4f42baa2994801a02b88934a5f9c8609d3c9c
              • Opcode Fuzzy Hash: 3cbd7cb6204493704c6b733bfbadc339532ca58f824ae1d0721fdf5d08ff1f7a
              • Instruction Fuzzy Hash: 3D51B778E00248DFDB44DFA8D5549AEBBB6FF8C311F208029D805AB398DB356D85CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ce70f5d8876ebf4f4dc9389df5da16c1073fec5e35c9486c7636035f943784e2
              • Instruction ID: d341cf77af9e89fa8be784fc873ce9abfed09499c4b64f4f810943175299f18f
              • Opcode Fuzzy Hash: ce70f5d8876ebf4f4dc9389df5da16c1073fec5e35c9486c7636035f943784e2
              • Instruction Fuzzy Hash: 9D519778E002499FDB44DFE8D5589AEBBB6FF9C301F108029D815A7398DB356D85CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a5c1f2e1db6db9bf6cac8b7e1bf1ea0318539162a916043e55ee3232abea1005
              • Instruction ID: 6e472beb366a853b5bc5b2820319fefe82e02711fd39c500c76c914415dc3d26
              • Opcode Fuzzy Hash: a5c1f2e1db6db9bf6cac8b7e1bf1ea0318539162a916043e55ee3232abea1005
              • Instruction Fuzzy Hash: 89511E78E05258CFDB55DF98D858BAEBBB6FF88300F1081A9D50AAB354CB345985CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 853a5e1428b9dff2d68eb4b6a425c35e777a826946a6ecac269dd21ccb9b229c
              • Instruction ID: 83a2f6d88fd5e6e27a0ddfad914f1870b0ef3513bcff33defa95a6563e66be3c
              • Opcode Fuzzy Hash: 853a5e1428b9dff2d68eb4b6a425c35e777a826946a6ecac269dd21ccb9b229c
              • Instruction Fuzzy Hash: FD511A74E0421ADFCF48EFA9D488AFDBBF6FB89300F408469D519A7254DB746A41CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bd6a31ac76c4e344fdb0ea9098d31ee7574bc7649e5c6cf177740c010fb010c4
              • Instruction ID: 378c584353e4474fce16a2bed2784e045584b71b181ebddbd85a54a867edc471
              • Opcode Fuzzy Hash: bd6a31ac76c4e344fdb0ea9098d31ee7574bc7649e5c6cf177740c010fb010c4
              • Instruction Fuzzy Hash: 67510278E04228CFDF14DFA5D458BAEBBF2FB89300F10906AD41AAB644CB745982CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ae50cd8409924c983ec031691752ec3465dea62e22f189e77f14d7986e2df7f8
              • Instruction ID: 9bb36446c3a4df74d6042d4cd105d2036a770d406aa320673885544cb4a6058d
              • Opcode Fuzzy Hash: ae50cd8409924c983ec031691752ec3465dea62e22f189e77f14d7986e2df7f8
              • Instruction Fuzzy Hash: 6941EE74E05228DFCF09DFA9E594AEEBBF2FB88310F248029D405A7254DB35AD42CB51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aa8773dc5d9188bbb4a3669118e1823a250205cb9f620661d0474351b28c177e
              • Instruction ID: bdcc53a50dbef80cadbb09c461af743365e9a5b902c29de3f2cfd167523497dc
              • Opcode Fuzzy Hash: aa8773dc5d9188bbb4a3669118e1823a250205cb9f620661d0474351b28c177e
              • Instruction Fuzzy Hash: B0414A35B006168FDB18CF69C484DAAFBF2FF89310B15C569D469AB751DB34E802CB94
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 38ace856c4de2155418e943d8d3a5215688ddc8846cf1793c7c77fa2e23f55a6
              • Instruction ID: 45407ca7703663a912e5fdd1b54f4b872e0bb9430aae2cee75ebd3785cea0aa2
              • Opcode Fuzzy Hash: 38ace856c4de2155418e943d8d3a5215688ddc8846cf1793c7c77fa2e23f55a6
              • Instruction Fuzzy Hash: CE41F374A00229DFCF08DBA9E584EAEBBF6FB88310F108469D405AB750DB38A941CB51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c99844519dccbf7d10bb14ec264f3798b3db909ab558f3d028e06ebd214fa4c2
              • Instruction ID: 525cd9cd4341f38ad7880b7c35d40e1a2021145c4a66fb20a2e1c71cdfef0040
              • Opcode Fuzzy Hash: c99844519dccbf7d10bb14ec264f3798b3db909ab558f3d028e06ebd214fa4c2
              • Instruction Fuzzy Hash: F441F674E05219CFDB04DFA9C4886EEFBB2FB89301F1480AEC406AB294D7345982DF52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 825bda72055d88e4de3f5cc6c72560f93ac69ba9d993fdf6224c44c9d0618ab3
              • Instruction ID: 68898a25241b10513da02efa7cdac04baa47e1302e95bc55a6ca35e91cdbd109
              • Opcode Fuzzy Hash: 825bda72055d88e4de3f5cc6c72560f93ac69ba9d993fdf6224c44c9d0618ab3
              • Instruction Fuzzy Hash: 2E51E778A05258CFDB54DF98D958BADBBB6FF88310F1080A9D50AAB254CB346D85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e6f7e82048d0f76aadb3846addeb3162b3f961d8dd3b6592d78bbb79edc6bfd0
              • Instruction ID: 84c3737686750f5c57002eb743ac774dfcd42e34486b2303dc12da725743ee46
              • Opcode Fuzzy Hash: e6f7e82048d0f76aadb3846addeb3162b3f961d8dd3b6592d78bbb79edc6bfd0
              • Instruction Fuzzy Hash: 2C516F79E04218DFCF04DF99D494AADBBF1FB88360F14806AE915AB354DB34A941CFA0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4730526de6c1e9980a5c601ee9c776544a107ce62d57990fa96a4ebf5ebcc6b4
              • Instruction ID: bfae2d4d3b63e90a1b93de3a917fde79d6d74ba80a830f90f1c6ff76b194144b
              • Opcode Fuzzy Hash: 4730526de6c1e9980a5c601ee9c776544a107ce62d57990fa96a4ebf5ebcc6b4
              • Instruction Fuzzy Hash: 3841E074E05228DFDB09CFA9E594AEDBBF2FB88300F248029D805A7354DB75AD42CB51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b8181a63cc104ca9d5f02834a69880e97d2c34526187a18494a248ac12e0eef
              • Instruction ID: 8764da8430e02d5f6ec44d69f0e357ab00fd8d1de9f0f3b1c2a88fb0c7cf1871
              • Opcode Fuzzy Hash: 1b8181a63cc104ca9d5f02834a69880e97d2c34526187a18494a248ac12e0eef
              • Instruction Fuzzy Hash: 2C414374E0422CDFDF18CBA9D458BEEBBB2BB99300F10906AD4566B645CB741986CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c62728c8780c998409b3be93d4d8e92570b9313e9280bb3be0612adbd36b0564
              • Instruction ID: 00f740417b059c6ace93426dde107c5f7e42f82868670298b375e4ab55edeb45
              • Opcode Fuzzy Hash: c62728c8780c998409b3be93d4d8e92570b9313e9280bb3be0612adbd36b0564
              • Instruction Fuzzy Hash: ED410174E0422CDFDF18CBA5D458BEEBBF2BB89301F10946AD41AA7244CB745986CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2acee734883d80a7f667fd5a0fa7c7e41ca0533bf316f77b48350042854723a1
              • Instruction ID: 7a8939676a0c7d1b2eb62b0c072baffdebb43d858b70d908fcece63ab1fde71c
              • Opcode Fuzzy Hash: 2acee734883d80a7f667fd5a0fa7c7e41ca0533bf316f77b48350042854723a1
              • Instruction Fuzzy Hash: A9414174E0522CDFCF18CBA5D858BAEBBB2FB99300F00905AD4566B245CB741986CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ae83f21dc7e0c97a5957edd786bd0e04c8aa6f63cf7bfffbf637101cfc306301
              • Instruction ID: 8075ced2427a8a88861362cba32391498ddb7024b0d05177015b1a853a8d2087
              • Opcode Fuzzy Hash: ae83f21dc7e0c97a5957edd786bd0e04c8aa6f63cf7bfffbf637101cfc306301
              • Instruction Fuzzy Hash: F7412274E0422CDFDF14CFA5D898BEEBBB2BB89300F00905AE4156B644CBB41986CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1e15129d07040b5966ab743fba711d6d003614c983a818354ee9949b41dd014b
              • Instruction ID: beb8bf43489354c9d58ec4e64a3daabef2e8bee57b919f727d04073baa48f855
              • Opcode Fuzzy Hash: 1e15129d07040b5966ab743fba711d6d003614c983a818354ee9949b41dd014b
              • Instruction Fuzzy Hash: D3415478E0422CDFCF18CFA5D454BEEBBB2BB99300F10945AD45667245CB741986CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 33f128f5c61180b1de1e4f3f45d7965dce2067deaab3a354aa526f7795c37892
              • Instruction ID: 380f6194e737f0f4c9045e406dc2af5b9f7de6cef7b27b888e5f308270275a72
              • Opcode Fuzzy Hash: 33f128f5c61180b1de1e4f3f45d7965dce2067deaab3a354aa526f7795c37892
              • Instruction Fuzzy Hash: B751E878A011588FDBA1DF28D9547FABBB2FB98300F1091E9990DA7394CB355D81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0602010f45c936e16f8219d8d31ceacbfd342c95b2da7820c38b260a406cbd8d
              • Instruction ID: 478edb686b5ef7d7b3fe3af4d1827600d083a4155860ac60609c2b95dacbfb08
              • Opcode Fuzzy Hash: 0602010f45c936e16f8219d8d31ceacbfd342c95b2da7820c38b260a406cbd8d
              • Instruction Fuzzy Hash: F3411678E05258CFDB54DF98D498BADBBB6FF88300F1080A9D50AAB294CB346D85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7a7ee7537800cf0bed8aac3d60c2b3da6d613716339eb49e2d6d6471caae02ab
              • Instruction ID: 2a60cab067889f98884e277fc3055b6cfec49acecb359132ad696d483236156b
              • Opcode Fuzzy Hash: 7a7ee7537800cf0bed8aac3d60c2b3da6d613716339eb49e2d6d6471caae02ab
              • Instruction Fuzzy Hash: D2419375E102299FCF04DBA9D484AEEBBF1FB88311F14802AE915A7354DB349945CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fa70a02a4c6bce4b3462370eba2f93702381847396d3a6c5ba3f3e74ca5385d6
              • Instruction ID: 6dc28d57185c6786af6f568ca076f6e490fc87453f99dd428544bf80ec0c0177
              • Opcode Fuzzy Hash: fa70a02a4c6bce4b3462370eba2f93702381847396d3a6c5ba3f3e74ca5385d6
              • Instruction Fuzzy Hash: D3313874E0021ADFCF48EFA9D488ABDBBF6FB89304F408468D519B7254CB786A45CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9f338b88e6e46674000c35039de5cb270e7e462c085728373f5d3e9f3ce0f22b
              • Instruction ID: 0c31e2a19d9201b1dcf6a46908cee0b62ac95b40851e73b090d853bb900ab8cf
              • Opcode Fuzzy Hash: 9f338b88e6e46674000c35039de5cb270e7e462c085728373f5d3e9f3ce0f22b
              • Instruction Fuzzy Hash: A9412678904258CFDB60DF68D8587ADBBB2FB99301F1090ADE909A7395DB385E81CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bad809fe749f858d6c2d88766bea3cc9c99f28da5dc454c448b36d3e5299c19b
              • Instruction ID: 3f6a3e2d1fb950dc06a5528534a0596b7947a109908e0de159d02638e91e0a15
              • Opcode Fuzzy Hash: bad809fe749f858d6c2d88766bea3cc9c99f28da5dc454c448b36d3e5299c19b
              • Instruction Fuzzy Hash: 1531CFB5D0D3C48FCB02DBB8D8646EE7FB5AF1B314F0440EAC89597296E6344904CBA2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7657f11b300c8b33bfd355cf00c9d1077a1ef4c4adeecd64a3bb574a0eb850dc
              • Instruction ID: c56367fc2815d73a744e03fcd96816cb456468a45cc6a6c7cc97a617d34ea73b
              • Opcode Fuzzy Hash: 7657f11b300c8b33bfd355cf00c9d1077a1ef4c4adeecd64a3bb574a0eb850dc
              • Instruction Fuzzy Hash: B0315A70E052498BCB16DBA8D548AFEBBFAFB89300F5040ADD805A7250DB756D41DBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 07ce351023933a7b52ff99e62a619362310602ed8cc73257263f5e29de9945ed
              • Instruction ID: a3e3243c5100dc270cda76ca7322b5018127d1f9e1e3a4cb2032ee459cebe04c
              • Opcode Fuzzy Hash: 07ce351023933a7b52ff99e62a619362310602ed8cc73257263f5e29de9945ed
              • Instruction Fuzzy Hash: 8A31B475E042299FCF04DF99D484AEEBBF1FB88321F049026E914A7344D734A985CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d036f65f4030e581bf3faff6e5448fe5ba1703960bd970501c34b5a691305c09
              • Instruction ID: d766c35fed8d6869a289d33cfc8f70deb1540f6d8ed581d5f3297abd7b578130
              • Opcode Fuzzy Hash: d036f65f4030e581bf3faff6e5448fe5ba1703960bd970501c34b5a691305c09
              • Instruction Fuzzy Hash: 9C215CB4E0121ADFCF08EFA9D588ABDBBF6FB89300F408469D105A7254DF786946CB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 09300a45769efa008650866c6c3d25a707098284e0c2225bf8e065bd2c4dd64b
              • Instruction ID: bdf5122745e9e2b4d2b320843ecffa0de76c90b99190675d51074d1829dc9da4
              • Opcode Fuzzy Hash: 09300a45769efa008650866c6c3d25a707098284e0c2225bf8e065bd2c4dd64b
              • Instruction Fuzzy Hash: C231C274E04219DFCB18DF99D494AADBBF5FF88310F14802AE915A7360DB34A941DF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 913e1bd5dc2a4f209257ceda17fe2ae985dfb3f39cf3b793ac37d8da960bcfe4
              • Instruction ID: 3c267bf743ac8956bdf1d0f5adda47ec16022e4c1857ea90ffad5ed139180ae9
              • Opcode Fuzzy Hash: 913e1bd5dc2a4f209257ceda17fe2ae985dfb3f39cf3b793ac37d8da960bcfe4
              • Instruction Fuzzy Hash: CD31F4B4D15209DFDB41DFA8D4446AEBFF6FB88300F1080AED808A7654DB345A95DB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c763a26d002111b4ecbd928c18f3f945989f71ce21e292b8f998185e44754a5c
              • Instruction ID: 4632de1aa656550edbe20ab16a2551eccc5404fa59b9e4e398640d6afa0c8a27
              • Opcode Fuzzy Hash: c763a26d002111b4ecbd928c18f3f945989f71ce21e292b8f998185e44754a5c
              • Instruction Fuzzy Hash: 8F216BB8E00248CFDB14DF99D448AFDBBB6FB88304F109069D80AAB344DB349846DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7939fa31bea8048d2751eebd553161987e7d7915fec5136f64754620e5878e95
              • Instruction ID: f19ff8bdec8a119e5ee6da3a72e11055889019618cc2c343999eef9d4f979a1f
              • Opcode Fuzzy Hash: 7939fa31bea8048d2751eebd553161987e7d7915fec5136f64754620e5878e95
              • Instruction Fuzzy Hash: 7631F878E00248CFDB14DFA8D498AEDBBB6FB89304F109069D80AAB344DB346846CF54
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 98437d7107d12448dc61e88df9ad8679cd87fb5472f3fdbf1f8a8a541eb2ecce
              • Instruction ID: f196f7dc22ade324e2bfc97b6f54fb1562c32191b74a3ff99b85a105483c240a
              • Opcode Fuzzy Hash: 98437d7107d12448dc61e88df9ad8679cd87fb5472f3fdbf1f8a8a541eb2ecce
              • Instruction Fuzzy Hash: 90310974E00209DFCB45EFA8D4949AEBBB1FF49300F10859AD815AB361DB34AE41DB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9cf38a2322fa4e8e0f165c0486d6ec2116b658a645ea43a45e30e4a010bee6e7
              • Instruction ID: 475bdf236b900c1cc9157bea4d36e06ff823d3b67d2c1ca863360bc243187904
              • Opcode Fuzzy Hash: 9cf38a2322fa4e8e0f165c0486d6ec2116b658a645ea43a45e30e4a010bee6e7
              • Instruction Fuzzy Hash: 13218639E0421CEFCF44DFA8D580BADBBF0EB48320F1480A6E815A7254D731AA02CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9afbb2fb195a7ab73d8514957bd1bb5afe817dc628fe12f372ee2d7ec984048b
              • Instruction ID: 04dc926ea69bb86376914b4568fadbc6e107efd2ef4ea52ca292250d50e50aae
              • Opcode Fuzzy Hash: 9afbb2fb195a7ab73d8514957bd1bb5afe817dc628fe12f372ee2d7ec984048b
              • Instruction Fuzzy Hash: 9D31F4B4D14209DFCB41CFA9D4446BEBFFAFB88300F1090ADD808A7244DB345A91CB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4cc234c5c313f792f47f3b230e0a9a0462ad7cd22b8542f00e0650f98fe6361b
              • Instruction ID: 7b45801c8d358591e34ea56ace9e8e5d76c00b447a1372b712eedd0528336943
              • Opcode Fuzzy Hash: 4cc234c5c313f792f47f3b230e0a9a0462ad7cd22b8542f00e0650f98fe6361b
              • Instruction Fuzzy Hash: 5F31CEB4D05259DFCB54DFA9D4446BEBFF6EB88300F1080AA9918A7254EB745A818B81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b1e03108aa20dad2a8e1c88a1f1ef6b57c61818d0ace1599f9ff0e3b87b68c2f
              • Instruction ID: f358a88e8775c69341f216cb1bb24d9e3b15d6c9c075d7b3662a4517e332f0dd
              • Opcode Fuzzy Hash: b1e03108aa20dad2a8e1c88a1f1ef6b57c61818d0ace1599f9ff0e3b87b68c2f
              • Instruction Fuzzy Hash: 0531E0B4E01249DFDB54DFA9D5847BEBFF6FB88300F1080AAD518A7254EB745A81CB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b7cb98f3db928cc18c5a7f3c27af6c02bda100d64b1a0fd3ac30b31e353f06a8
              • Instruction ID: 9fc1008019364ea3c646069d82c012dbd020f61f915aa2d54da64b4aed70a18f
              • Opcode Fuzzy Hash: b7cb98f3db928cc18c5a7f3c27af6c02bda100d64b1a0fd3ac30b31e353f06a8
              • Instruction Fuzzy Hash: FA216474E00209DFCB44EFA8D4959AEBBF1FF49300F5085A9D815AB364DB34AE41CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e554908c431e6941bc92299f0af08fe8de846a0802c8ea2b0dda03aee3e8c9c0
              • Instruction ID: 9e8589ec98d2140881c8ed8086e5160b120662ce11684db85a6ade7cbec0071f
              • Opcode Fuzzy Hash: e554908c431e6941bc92299f0af08fe8de846a0802c8ea2b0dda03aee3e8c9c0
              • Instruction Fuzzy Hash: 25217574E00209DFCB44EFA8D495AAEBBF1FF49300F5095AAD415AB365DB34AE41CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ef7f97a702a87a8771bf5316561e18422981aaffc24fb6361cc9743edd4ee22
              • Instruction ID: e287463cd256d4f9b81ad7d0d451947216368378aa33918560cbe738b4abeba0
              • Opcode Fuzzy Hash: 7ef7f97a702a87a8771bf5316561e18422981aaffc24fb6361cc9743edd4ee22
              • Instruction Fuzzy Hash: BB318374E00209DFCB44EFA8D4949AEBBB2FB49300F5085A9D815AB364DB34AE41DF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6632a06bc383d23a84d7d3ed6bb37275076d864c33ad70bda26274e2b053b4f6
              • Instruction ID: a69da9d0dd22fca62475e2a338a816257026ce850e21e886dc3711d86b2329ea
              • Opcode Fuzzy Hash: 6632a06bc383d23a84d7d3ed6bb37275076d864c33ad70bda26274e2b053b4f6
              • Instruction Fuzzy Hash: 93115C34E041199BCF08DF9AC404BEEBBFAEF88300F04C06AD515A7250DB349A45CFA0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b02db2e1bad00887e31fb17d758c4705aeb2693b8cb137430599894d0b71fb66
              • Instruction ID: 4d024e4786847758b9c7e9b222c822317a507969ba3ba06f4b9f61a1de6de6b2
              • Opcode Fuzzy Hash: b02db2e1bad00887e31fb17d758c4705aeb2693b8cb137430599894d0b71fb66
              • Instruction Fuzzy Hash: EF112935E04129CBCF08DFAAD404AEEBBFAEF88311F04C0AAD515A3254DB349A55CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c0f77083287064920c798c0f50a4ae24b3790c5d02e5344fd93586e3b18902f0
              • Instruction ID: 63ab9c872f8d1ee29598d49477048f40c430d767828e0744d04fbff53721df03
              • Opcode Fuzzy Hash: c0f77083287064920c798c0f50a4ae24b3790c5d02e5344fd93586e3b18902f0
              • Instruction Fuzzy Hash: 2621AE34905609CFCB01DF98E848ABEBFBAFF89300F0054ADD80AA7255DB742E49DB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe88a7e93bc7c5ff44bfbdffa4f67ffc77cb4fc0c29b62c76c2ffb77081eb66d
              • Instruction ID: 4461e487d2bb6bbf44c35cdd084023a559381dcd02bbaeef40e854dea7ee500a
              • Opcode Fuzzy Hash: fe88a7e93bc7c5ff44bfbdffa4f67ffc77cb4fc0c29b62c76c2ffb77081eb66d
              • Instruction Fuzzy Hash: 7E21A374D15209DFCB45DF98D498AAEBBF5FF48300F108099E855A7360DB34AA80DF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3aceb239c7c5de38fdc5e653f17e151f5bd6f6b8ec34ce06123ce1a01bf92b78
              • Instruction ID: 6459b6f0110a743f7d388170e20d53bf78f176350aa054e10a32c8c4c5a182e0
              • Opcode Fuzzy Hash: 3aceb239c7c5de38fdc5e653f17e151f5bd6f6b8ec34ce06123ce1a01bf92b78
              • Instruction Fuzzy Hash: 02116A30905609CFCB05EF98E848FBEBBBAFB89300F0054ACD90AA7255DB742D49DB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 838c695c0a6e0faef7fdbd9342e4943d17f53fc4fab66a26d1f0376a22e9d419
              • Instruction ID: 9d56ee2937db982ddf7fb7e346872442fa49da433751ef3f59a24f99b17bd910
              • Opcode Fuzzy Hash: 838c695c0a6e0faef7fdbd9342e4943d17f53fc4fab66a26d1f0376a22e9d419
              • Instruction Fuzzy Hash: 81216EB4A14209DFCB45DF98D498AAEBBB5FB48310F1080A9E915A7350DB35AA81DF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1bc542e9dc175a3543e09b7e7fb2782f871e584f866ef8926fb1c68538d01abe
              • Instruction ID: 7ef69916de12cab80cf64faffd6bf510ad63c41228bba53cd3e79c4878d9a8f3
              • Opcode Fuzzy Hash: 1bc542e9dc175a3543e09b7e7fb2782f871e584f866ef8926fb1c68538d01abe
              • Instruction Fuzzy Hash: FF21C374E04219DFCB49DFA9D945ABEBBF1FB88304F10816AD819E3254DB345A41CFA0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0160a7088b7eff000911ca80f1724c4eeb44aac7b080d3903e1fc2fd3885c73b
              • Instruction ID: bbc5cf45f5e91b0226a2a9ac4a9863edd99ba239297020ebbf0da3411d081adf
              • Opcode Fuzzy Hash: 0160a7088b7eff000911ca80f1724c4eeb44aac7b080d3903e1fc2fd3885c73b
              • Instruction Fuzzy Hash: E0210978A042588FDB54DFA8D858BAEBBB6FB9C300F104069A409A7395CF346D81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.360227865.00000000031B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_31b0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8068e941fc92e2b63164cf82a30a8353295ce93b1f04dd6e66afc09cfdd51f93
              • Instruction ID: c6e1700a04a5f9f0db20385d85e0f345dff89b1edde823b4c590046c1ea34dca
              • Opcode Fuzzy Hash: 8068e941fc92e2b63164cf82a30a8353295ce93b1f04dd6e66afc09cfdd51f93
              • Instruction Fuzzy Hash: C311F83124E3D45FC7578B248CA5A553FB1AF4B610B1A40DBD985CF2B3C629AD09CB62
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b9d12d92dc19cbab69909f83c9ff6f76a2e7fb28779ae6842730460cd09155d2
              • Instruction ID: 3cfdeec6116e0bd91fd6220783ddf81530b5cee9dae0d9d0f9113961219c0a42
              • Opcode Fuzzy Hash: b9d12d92dc19cbab69909f83c9ff6f76a2e7fb28779ae6842730460cd09155d2
              • Instruction Fuzzy Hash: 5F1107B1D01208DFDB44DFAAE5856AEBBF6EB88300F2085A9D419A2248E7745A419B91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 12e556550d0bda02678158b0f4f5f04b53844a78834ff3d9f7ecc9af7ae8df4b
              • Instruction ID: 804652f2aef05b840035461c475707e845bafe397b347c709f72e3d0e245e653
              • Opcode Fuzzy Hash: 12e556550d0bda02678158b0f4f5f04b53844a78834ff3d9f7ecc9af7ae8df4b
              • Instruction Fuzzy Hash: 8E11C675E10228AFDB08DBAAD845AEEBBF5FB88310F04C02AD925B7354DB345445CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a09b7b0aa7854063948ecefacde3f50525f1d3b9fdbe6953ecb0b185dc3503f8
              • Instruction ID: 83addf028af8332683bf2d3507321d5ea4ce1b160bdc9ac150d47a570e897860
              • Opcode Fuzzy Hash: a09b7b0aa7854063948ecefacde3f50525f1d3b9fdbe6953ecb0b185dc3503f8
              • Instruction Fuzzy Hash: 4F11E974D05208DFCB44DFAEE4846BEBFF6EB88300F6084ADD419A3248E7745A419B90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0fbc1e4266fd0acf9cafe2788d9905f677a36dc79d9cb19c99e2264a7b6168fa
              • Instruction ID: 6cada9db40b236b2189ad2977e99b58a6a2fd3da214b259be58ad3d1c509c92f
              • Opcode Fuzzy Hash: 0fbc1e4266fd0acf9cafe2788d9905f677a36dc79d9cb19c99e2264a7b6168fa
              • Instruction Fuzzy Hash: 9801AD76D05218FFCB04EFA8D845B9DBBF9EB54310F04C0AAE804D3254DA319A50DB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 647071a34da40b46247ce8f018a58f6a813e1cbb591cbea918974a2398f38604
              • Instruction ID: 8b7de2093b4ea4a7cee516f96b64a44e1458e77ed95026c24736f16eb181241e
              • Opcode Fuzzy Hash: 647071a34da40b46247ce8f018a58f6a813e1cbb591cbea918974a2398f38604
              • Instruction Fuzzy Hash: 53219578A042688FDB64CF58D984BEABBB2FB49300F1040D5E90DA7365CB35AE81CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62f3dc3ba3ffaf6094ecb1666e89372c9fcd17b87b31fc75077e1e306ec3af5d
              • Instruction ID: 8994049910ad29f0bce8e0867b909ba88f318b65344a6f5c891df52fb78dfaab
              • Opcode Fuzzy Hash: 62f3dc3ba3ffaf6094ecb1666e89372c9fcd17b87b31fc75077e1e306ec3af5d
              • Instruction Fuzzy Hash: 23019E7180120CFFCB11EFA8D844A9DBFB5EB49301F6480EAD905D7214EB329A50EB41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2630a7097f761f669292fd48a8f3ad7e838bc67134972b7bb40ad8296902a89a
              • Instruction ID: b000449b9261111e801a03ffe1d0c373ef805f3d5cb435c2bd79830da2e77de1
              • Opcode Fuzzy Hash: 2630a7097f761f669292fd48a8f3ad7e838bc67134972b7bb40ad8296902a89a
              • Instruction Fuzzy Hash: 72115B74E14209DFCB41EFA8D4496BEBFFAFB49300F1090AD9819A3344DB305A40CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8781c7996ae0ccced5744de7c895d6cc862c361bbe49d3a52f748a194a5ef646
              • Instruction ID: 5b626811681f673a56ae21c09fa92ec66bf2a3679d0eb3c16aa79202ba20d71b
              • Opcode Fuzzy Hash: 8781c7996ae0ccced5744de7c895d6cc862c361bbe49d3a52f748a194a5ef646
              • Instruction Fuzzy Hash: 881139B4E0024ADFCB00DFA8C4586BEBFB6FB88314F1080B9D915A3394DB316A45CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1ddd0240ebdd4539e195b4d3343bce4ba23de192a4916d9ab521ac22fefb1412
              • Instruction ID: 7f1e7cca0c15d1b4d4acfa79008348989cb4037b230923af5c2df606f58ab63a
              • Opcode Fuzzy Hash: 1ddd0240ebdd4539e195b4d3343bce4ba23de192a4916d9ab521ac22fefb1412
              • Instruction Fuzzy Hash: 75018074A012099FC745EFA8D8157BE7BF5FB48300F1481AAE814E7345DB30A901CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df9a6278a0105b2c34b8a81a17133cf39f67f44c7ab758f084bc7bb862a2e5d1
              • Instruction ID: 89ac0fde6e8b9bbce4977a89e179b1b3aea8648fe38dce13f0b90460c3bada54
              • Opcode Fuzzy Hash: df9a6278a0105b2c34b8a81a17133cf39f67f44c7ab758f084bc7bb862a2e5d1
              • Instruction Fuzzy Hash: D6110971D052688BEB68DF2ADC44B9DBAB6ABC8300F04C0EAD40DB7254DE3059858F50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c6810e73be8e847107d3041dc70ec5257396ff60ee0aca277f9a5434dd23cf6
              • Instruction ID: e5d23d4e5935485f6d1693e47411658418643c271aec9103512cb4dc46f733f4
              • Opcode Fuzzy Hash: 9c6810e73be8e847107d3041dc70ec5257396ff60ee0aca277f9a5434dd23cf6
              • Instruction Fuzzy Hash: 8E01D778A05289DBDB24DF98D598ABDBFFBFB88300F20506DD80AAB254DB745941DB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7a2f8664172bd0f0daac50823e7b2ee6a01394555b0059005e5387bf32dd2140
              • Instruction ID: 6f7ce6ef1ad8db3b7d95eb772c6dbc6cfdcde59a8564cbecabd72b0c684fa4c3
              • Opcode Fuzzy Hash: 7a2f8664172bd0f0daac50823e7b2ee6a01394555b0059005e5387bf32dd2140
              • Instruction Fuzzy Hash: B1110774A0015E8FC794DF58D954BFABBB2FB98304F0080A5D90AA7798DF345E859F90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8701777414c717336842f90e5c89847cd01c1e750a28b9573642a291acb2ebba
              • Instruction ID: 047fccf03f7721fea46d1ae3ddb63de89b9958ca9e965ad25bfd2681338ff515
              • Opcode Fuzzy Hash: 8701777414c717336842f90e5c89847cd01c1e750a28b9573642a291acb2ebba
              • Instruction Fuzzy Hash: 9711AC34A08249DFCB05DFA8D458AADBFF1EF49310F6441AAD419A7355CB306D41CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9588a2c5f4cfbd06c8297488b96e2f7e34c88a83e03a627b2f92b6bbeebb6d35
              • Instruction ID: 97b8421a6f178df6502c041acb07bb50a4418848de428e54456c39d1c52839c9
              • Opcode Fuzzy Hash: 9588a2c5f4cfbd06c8297488b96e2f7e34c88a83e03a627b2f92b6bbeebb6d35
              • Instruction Fuzzy Hash: 7211E578A052099FCB44CFA8D884DADBBF2FF48300F118155E915AB366CB34AC46CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2eab78ed22d01e8f3143c8f7da520ce834aae77cfa29b8b912cc7956f5a5d86f
              • Instruction ID: 02e2c1d806b0ee36a62c6592be97eb71d4629fdce3c02ce4f7910dfa3011a829
              • Opcode Fuzzy Hash: 2eab78ed22d01e8f3143c8f7da520ce834aae77cfa29b8b912cc7956f5a5d86f
              • Instruction Fuzzy Hash: 5FF0DC317043009FC7208B6CC808EA57FE7EF8D300B2580EEE585DB362DA21EC02AB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19ead50c5ef4095a355dc504beda1f4a9fa24b5235d29feb0d1796220142784d
              • Instruction ID: f32c44366ae7bbd4e1b7d888268a33c4e42bbc0d922194284259dd569ddd5c61
              • Opcode Fuzzy Hash: 19ead50c5ef4095a355dc504beda1f4a9fa24b5235d29feb0d1796220142784d
              • Instruction Fuzzy Hash: 5E01BC30922248EFCB42EFA8D9586ACBFB4EB45300F6080EEDC08E3340DA319A45DB11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 14b4a3dcab7525d13302014816844d40ad9b4d177c551cf35c634cdd95a2fce1
              • Instruction ID: de701e4cffa824d17945d8039e89a64e1af333873783ae99a19deb4a7207db40
              • Opcode Fuzzy Hash: 14b4a3dcab7525d13302014816844d40ad9b4d177c551cf35c634cdd95a2fce1
              • Instruction Fuzzy Hash: ED014CB4E0424EDBCB00EFA8D4596BFBFB6FB88315F108079D915A3254DB305A45CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f731c55f36d220acd6b8614fd2c1c8b9ebb0d204869d423f1f833910d8b2d7ca
              • Instruction ID: ab33026414c634fad1fa8ae68140d69b3daddffaa48423ad02beecd3cd995b32
              • Opcode Fuzzy Hash: f731c55f36d220acd6b8614fd2c1c8b9ebb0d204869d423f1f833910d8b2d7ca
              • Instruction Fuzzy Hash: 83011E74A05188CFCB14DF59D584AADBFBAEB4D300F10D89DD40AA7215CB30A942DF51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4c092f8e8ba8ff1fd480f65123f2f0a10fda0a518ebb0ebb8af65eeb95f923a6
              • Instruction ID: ff5e4f9e7e2eea8048090d07ff550bf22289914d34bf49ab3875d4866276ca84
              • Opcode Fuzzy Hash: 4c092f8e8ba8ff1fd480f65123f2f0a10fda0a518ebb0ebb8af65eeb95f923a6
              • Instruction Fuzzy Hash: C101B374E05218DFCB45EFA8D445AAEBBF5FB48300F5085AA9819A3354EB34AA41CB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cf48de6b3fba0479c8b0aaa18425a9ae38771143fc44e66f14730ba4425d4cd7
              • Instruction ID: 79f13ac02b54e49b1f2337958f8ee6b73da91e72893685c4ce07d418c2051c62
              • Opcode Fuzzy Hash: cf48de6b3fba0479c8b0aaa18425a9ae38771143fc44e66f14730ba4425d4cd7
              • Instruction Fuzzy Hash: 1D01D370D056688BEB68DF6ADC44B9DBAB7BBC8300F04C5EAC40DB7254DA705A858F60
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7cdbe0743f375c50c8e15068bf0c8d4d8dac9a576515547dfc6b179859378ead
              • Instruction ID: 343e6ffe18f6b64ffc6fe53f492ed5b1ced0d565ced8ec4f6af7c33ccdf15b87
              • Opcode Fuzzy Hash: 7cdbe0743f375c50c8e15068bf0c8d4d8dac9a576515547dfc6b179859378ead
              • Instruction Fuzzy Hash: 15012974A0525CCBC754DF58E448BB97BB6FB89312F5050ACE40A9B294CF749C85EB01
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c8fd36dd6f2b2a210d2e1e163584e377e850399157b0326f6ccb603e28ffd97
              • Instruction ID: dc7e46f67af684f407730c9eb0d19255cf5bf5d7ec2d1bc5c4f4d32b1b31e603
              • Opcode Fuzzy Hash: 9c8fd36dd6f2b2a210d2e1e163584e377e850399157b0326f6ccb603e28ffd97
              • Instruction Fuzzy Hash: 5C0128B4D06248AFCB05DBA8C588AADBFF5BF49310F1480DED458EB345D6309A45DB62
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f44f7ad1e308a55de9e24ee1275e35eece214eb82c0af5bf969a3ed829a4841b
              • Instruction ID: 80e2ffc11aa2bc5677f28683fca67b3ac990483c9889ce7f2e1fde9b3af35eca
              • Opcode Fuzzy Hash: f44f7ad1e308a55de9e24ee1275e35eece214eb82c0af5bf969a3ed829a4841b
              • Instruction Fuzzy Hash: 4A018C74E05219DFCF48EFA8D808ABEBBFAFB4C300F0085A9981993344DB705951CB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ba9f2630c9c8d01f0443221ddcd6862ac5f8744a96a1e392a0ca336edc7aceaa
              • Instruction ID: dfb5698fd5acc185b68ff7a672657c24a473b8d50f3033b5a82d25c77cffadaf
              • Opcode Fuzzy Hash: ba9f2630c9c8d01f0443221ddcd6862ac5f8744a96a1e392a0ca336edc7aceaa
              • Instruction Fuzzy Hash: 76016934E05248EFCB41DFA8D58596DBFB1EB49300F50C0DEA808A7341CA36AE02DB41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1c3102f62143134a2b567576c553b2d83e71f08e9af0902da8bbb059109ad3d4
              • Instruction ID: 96621e08e338b190fc9ea848f93eec1480d87c12e6f2d82c4928b0e5055143ec
              • Opcode Fuzzy Hash: 1c3102f62143134a2b567576c553b2d83e71f08e9af0902da8bbb059109ad3d4
              • Instruction Fuzzy Hash: 9D014F74E012199FCB44EFA8D4546BEBBF5FB48300F1441A9E814E7354DB349E01CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d7ca3083ab921276e4a48ac4efeea180b254b29bc015f56a826d10d5e9b702ac
              • Instruction ID: 97b0b509e57de0c3dcdb97443c8693994566f17f18dedc0524e1388a0cf7237d
              • Opcode Fuzzy Hash: d7ca3083ab921276e4a48ac4efeea180b254b29bc015f56a826d10d5e9b702ac
              • Instruction Fuzzy Hash: DF014BB4D05319AFCB05EFA8C885AAEFFF0FB48300F14809AD849A3355E7309A41CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e8bd43309755af8d87bdf58ba601d455ee8ed9f8257523d56976606de9a6e9e2
              • Instruction ID: 99566866d14df1ea0cfb2dac779b8d444eaf52c453f4439a19063fdf63f6aa53
              • Opcode Fuzzy Hash: e8bd43309755af8d87bdf58ba601d455ee8ed9f8257523d56976606de9a6e9e2
              • Instruction Fuzzy Hash: 8CF0B43190110CEBCB04DF98D881A9CFF75EB51300F5081EDD80567364DB326A56FB95
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eb6084132533de9d6720b266100eebe8e6207f7f3e69384f284957abd3ab5c8b
              • Instruction ID: a776af310893762b3cec564ae029730921eb15ca1e2c1b2f4002231a996923d6
              • Opcode Fuzzy Hash: eb6084132533de9d6720b266100eebe8e6207f7f3e69384f284957abd3ab5c8b
              • Instruction Fuzzy Hash: 12011974D04219AFCB40EFA8D849AAEBBF0FB08300F5481AAD818E7359D734A941CF91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5ba8cccea67dbff7be3bc88d700ad3c7b1523469f9f0111d9ade0f048443fc11
              • Instruction ID: 4d69864c67f9b98b50d27406ab50af4b9353570402afe957d6eb8ae401fcda0e
              • Opcode Fuzzy Hash: 5ba8cccea67dbff7be3bc88d700ad3c7b1523469f9f0111d9ade0f048443fc11
              • Instruction Fuzzy Hash: 8BF06D30D04244AFCB51DBA899459ADBFF0AB06320B5481EFE818D7296D3319902AB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b3b5419e17d7f3f009d1409e4a1be3a51f3ce95eda50b2c5f471e2c0b5c2db66
              • Instruction ID: f805f44b212a195dd0c7de2c6261760a88a23fca25da4755380407fb8a757daf
              • Opcode Fuzzy Hash: b3b5419e17d7f3f009d1409e4a1be3a51f3ce95eda50b2c5f471e2c0b5c2db66
              • Instruction Fuzzy Hash: 93F0F070D04258AFCB11DBACC4095ACBFF0AB05310F9080DEE858D3385D2355903EB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fcbe13c1fb2edb8225bfe9a38ced4be5a1cddcf0d5c510dded378279cb8bdd39
              • Instruction ID: 45bfc05eb806db5ec9fed1557771a63ed14778074c2ec77c0e98615c755502b3
              • Opcode Fuzzy Hash: fcbe13c1fb2edb8225bfe9a38ced4be5a1cddcf0d5c510dded378279cb8bdd39
              • Instruction Fuzzy Hash: 3C01B274D05219EFCB14EFA8C485AAEFBF0FB48310F5080AAD919A3354E730AA41CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2cbc9e04b1bf84e845f0190e053b89c2c41952f8054736f7f4ef11174674e4da
              • Instruction ID: 2ec6d37b2d3609ce7a323e1eb8f8e51bf31440d9a5f09b32bc507bbdb53c3955
              • Opcode Fuzzy Hash: 2cbc9e04b1bf84e845f0190e053b89c2c41952f8054736f7f4ef11174674e4da
              • Instruction Fuzzy Hash: 99F06771C08248EFCB41DFA8D848AADBFF5FB5A300F1481AAE819E3215D7305A94DB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f201ca581108b216678f5a337cae5fd832f5f929323e469200757ce1b8fbbee4
              • Instruction ID: 4e22477d8a786e2cb83155dcae6f5c1f4c324d81a7d0e6902c0f669fdcfe1f13
              • Opcode Fuzzy Hash: f201ca581108b216678f5a337cae5fd832f5f929323e469200757ce1b8fbbee4
              • Instruction Fuzzy Hash: 7AF0F6749082DC5FC702CFACD8146FEBFB5EB0A311F5482DAE9A0962A7CA385541DF91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d0d16e74d498642ce44e7bef908942c4bbdd0233c9649946126bb1474eb4118
              • Instruction ID: 5b5c65b1ca1f41f4fa394dfc94152c0bf7c393ab2dd39b17243e3e5091c8d81d
              • Opcode Fuzzy Hash: 1d0d16e74d498642ce44e7bef908942c4bbdd0233c9649946126bb1474eb4118
              • Instruction Fuzzy Hash: B5F06D70D052499FCB18DFACD844AAEBFB0EF49314F6482ADD424A73A4D7355A42CB41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 744e1cc476a8ae7b7912aaa71148da3d5434356868001e823a447c3b01dbc23e
              • Instruction ID: faf33b5d08a6870bfcc04c5057e8e51e4abe2251c7db20e235004b5ea31cbd32
              • Opcode Fuzzy Hash: 744e1cc476a8ae7b7912aaa71148da3d5434356868001e823a447c3b01dbc23e
              • Instruction Fuzzy Hash: B8F08C35804258EFCB05DFA4D852BADBFB8EB48311F14C09AEC5492346C635AA62EB51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fc0978b033672ff4a06972812c6ef5dd7d25d6afa44e513e92346699c3fb5802
              • Instruction ID: 64edc4884cc4b7859dfabeafe2b52cedda9856506416419f2d148604de6a12f1
              • Opcode Fuzzy Hash: fc0978b033672ff4a06972812c6ef5dd7d25d6afa44e513e92346699c3fb5802
              • Instruction Fuzzy Hash: 3FF05870D05208AFCB41DFACD9486ACBFB8AB49300F1880DED818E7351E6319A42DB80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9e242d2df3b63e6e7b08a7c396901fc6e92cfb65616d76520559216e8e2df22b
              • Instruction ID: 6b9f3277de9e64eb87e79a8e6f3cc840d560b0890b7e3a7e52a8f5f367cc9f9d
              • Opcode Fuzzy Hash: 9e242d2df3b63e6e7b08a7c396901fc6e92cfb65616d76520559216e8e2df22b
              • Instruction Fuzzy Hash: 0CF0F974A0525CCFCB50DF58E848BB97BB2FB89311F5051ACE40AAB284CF759CC5AB01
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0953ee2811ae5b1f4c48b049540a0876be1373cde226d9a2a694dac03f27b80d
              • Instruction ID: 0a8f2f00d07810545509179eb394c31cc798afe627d497f32fd59e03b06853be
              • Opcode Fuzzy Hash: 0953ee2811ae5b1f4c48b049540a0876be1373cde226d9a2a694dac03f27b80d
              • Instruction Fuzzy Hash: 67F0DA38D01208FBCB44DFA8D845B9CBBB5EB48310F14C0999814A7354D635AA56DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a0a324869cdb267ba37c06a945fdd3b1ba0bddffb9f315fca3e4325d1b41ff10
              • Instruction ID: 63fb9425fcc1a09e9f725e9de4c2df58ca5b9d2f398ae72d83a34e849a9e573e
              • Opcode Fuzzy Hash: a0a324869cdb267ba37c06a945fdd3b1ba0bddffb9f315fca3e4325d1b41ff10
              • Instruction Fuzzy Hash: 2EF0F974D042089FCB40EFACD445AAEBBF4FB48300F1081AAD818E3358D7309941CB80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 49f2f1837810cf918e0682439e4653814549c1a3eb3aca2ca25912e374130ee2
              • Instruction ID: 6d55abec70db444757b2c0e0821a9dcae209997e3c95eb87a1b101cf9b49d983
              • Opcode Fuzzy Hash: 49f2f1837810cf918e0682439e4653814549c1a3eb3aca2ca25912e374130ee2
              • Instruction Fuzzy Hash: 65F08274D02208AFC750EFA8D445BAD7BF4EB48700F1081A5980493344EA345A848B80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: febd8392520189919e25525ff54a3269b4e8dffacd6b2b02ccbbec7c57df85f7
              • Instruction ID: d201eb22a11e91bb99c16922a4ff8afb9c97f6d6544748b8701371ca0f7f513c
              • Opcode Fuzzy Hash: febd8392520189919e25525ff54a3269b4e8dffacd6b2b02ccbbec7c57df85f7
              • Instruction Fuzzy Hash: 92F0F834D04208ABCB44DFA8D845B9CBFB0EB48310F14C1AAD958D7345DA35AA52DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad476ceea6eb2aee6f6548858f9b8a48d3dcc944e5ce9d7ddbe30231cd2d1413
              • Instruction ID: da5d0757b9823c93ea5f70bba0a9e039182a829d2884141b8f9a9e73aebc8a7c
              • Opcode Fuzzy Hash: ad476ceea6eb2aee6f6548858f9b8a48d3dcc944e5ce9d7ddbe30231cd2d1413
              • Instruction Fuzzy Hash: FDF06774D043189FDB40EFA8D8086ADBBF0FB48300F1080AAD818D3345EB342A41CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cd44107787b847fc4ef1b888a862dea568782d4cff3e7107a6fd569925b0e6ec
              • Instruction ID: 4f4802de3d554f96a27b33d8d4a6f467083effd6434409d00b1e5ec5a3428e35
              • Opcode Fuzzy Hash: cd44107787b847fc4ef1b888a862dea568782d4cff3e7107a6fd569925b0e6ec
              • Instruction Fuzzy Hash: 58F09A34D04288EFCB42DFA8C844A9DBFB1EB4A300F04C0EAEC59DB312C2318A51DB41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0b86b5bac3f1693573af1cb578b004038ca2c866dcbcf3e47f594ff0bbe60616
              • Instruction ID: a1156835330fe6541b16dacad231dbf64d99080f9bb1d649c13f41065ffa146d
              • Opcode Fuzzy Hash: 0b86b5bac3f1693573af1cb578b004038ca2c866dcbcf3e47f594ff0bbe60616
              • Instruction Fuzzy Hash: 2BF03AB4D0425CAFC741EFA8D955ABEBFF8EB48301F1081AAE915D3244DA349A40DFA0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a2719c7fd2181ca7b1359854c27fbe4c926b7da448c021923f243087c75acc79
              • Instruction ID: d76214fd406ba3cafe1a7c9e193a6283559e8e726421a94ff36462eda76d99ff
              • Opcode Fuzzy Hash: a2719c7fd2181ca7b1359854c27fbe4c926b7da448c021923f243087c75acc79
              • Instruction Fuzzy Hash: C6F0D479D00208AFCB45EFA8D885B9CBBB1EB49310F14C1A9A858A7354D631AA56DB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5021ab02aeea81f9f156d5bf7e3850e516eaad3a4bcde4d04a66b85e5977ca7b
              • Instruction ID: f5494f27a1c5cdde2d8266a2065452c04e0c08b4f7c0f9c5071b4dcee42a4cb3
              • Opcode Fuzzy Hash: 5021ab02aeea81f9f156d5bf7e3850e516eaad3a4bcde4d04a66b85e5977ca7b
              • Instruction Fuzzy Hash: 45F0A038801148AFCB45DFA8D841BACBFF8EB48311F14C199EC5493341C631AA62EB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c31533645d9b78d90b333da1f0222d7f3977a7fa1ab5f30d425db815b5db21aa
              • Instruction ID: 42b1e60ec8b73c472d0b0fe3c7b05d64d85ea08d55dcc404bd60ff9bfd2604ab
              • Opcode Fuzzy Hash: c31533645d9b78d90b333da1f0222d7f3977a7fa1ab5f30d425db815b5db21aa
              • Instruction Fuzzy Hash: 9BF03034D083489FCB00DFA8D55459DBFF1EF45308F1185E9E845E7791EA355A05CB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8ab5b5d86d98567e80cbb799c45ac16c2e2a28985ee61e27abe47f3e38dc3c04
              • Instruction ID: c535309803ebadaae4ffa1ef4cd9797eff13e596d581d48dbba2f75d537c52e6
              • Opcode Fuzzy Hash: 8ab5b5d86d98567e80cbb799c45ac16c2e2a28985ee61e27abe47f3e38dc3c04
              • Instruction Fuzzy Hash: B4F0A034E142849FCB20EBA8C995668BFB0AB06614F6440DECC08D3341E6319E41C781
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dde3fb8a9d6a84c0aec5dbfe7c3e58e93435a0b9f0598dd784653130f9bba2bb
              • Instruction ID: d5fa6eadc5b5fbb2ee17165952f24e1dac6ba73eda2c72d63644b77255fe562d
              • Opcode Fuzzy Hash: dde3fb8a9d6a84c0aec5dbfe7c3e58e93435a0b9f0598dd784653130f9bba2bb
              • Instruction Fuzzy Hash: AEF03034904249AFCB55CFA8C849EE9FFB1FF09310F1881DAE86897291C6319652EB51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 506f1d597fb75270eb8a198a4759bdac9e486ba67bdceb5c41d7fe9f85f9576c
              • Instruction ID: bfd35fa18e393309a11d9dd998612059d19ebaf168ce032b309af9f5754b5f2d
              • Opcode Fuzzy Hash: 506f1d597fb75270eb8a198a4759bdac9e486ba67bdceb5c41d7fe9f85f9576c
              • Instruction Fuzzy Hash: 16F0D43610524AEFCF0ADF94DD10EA9BF72FF59314F188199ED1816266C6329A72EB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5a48b5f76f5e07c58bc85c698a28fd3e91f16f5d0db4bd9ed92a07cac5c89e71
              • Instruction ID: 0455cf9f48929a6ef4b81921e06262459e1802d6ffe93ad6b25f594775d11df1
              • Opcode Fuzzy Hash: 5a48b5f76f5e07c58bc85c698a28fd3e91f16f5d0db4bd9ed92a07cac5c89e71
              • Instruction Fuzzy Hash: A1F01C74D00208EFCB55EFA8D445B9CBBF4EB48300F14C1A99C1893305D631AA55DF84
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0eadf3b3e16d743b3c9f4733e691dd6a74ffcfd41fc5b2e56d36f72800712ca6
              • Instruction ID: ee9167828de9d5d9e86cf1d5078b999f819c7eb5a88f4b423e9d30a85e15e2a4
              • Opcode Fuzzy Hash: 0eadf3b3e16d743b3c9f4733e691dd6a74ffcfd41fc5b2e56d36f72800712ca6
              • Instruction Fuzzy Hash: 99F03034D01208FFCB04DF98D481B9CBFB1EB88300F14C1A9DD0493344DA32AA52DB44
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1f79138ce412fe5edc7e8d46abb90b1c6c9c1607e0ab5512648186c3274fbabe
              • Instruction ID: 57d903ec40e29568633274a6442064269859041d9fd96f1d0cd545be2a931766
              • Opcode Fuzzy Hash: 1f79138ce412fe5edc7e8d46abb90b1c6c9c1607e0ab5512648186c3274fbabe
              • Instruction Fuzzy Hash: 46F03074D01208AFDB54DFA8D946B9DBBF4EB48314F54C0A9D818D3345EA31AA46CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 67d08dbc0940362a2426628aaf294a1f5071dccf166456d279230b1dcafd3661
              • Instruction ID: 3332f03d9d9bb2f37fa29370880cff5af3f5db075bd3a3618bd0f07cebd4b9f6
              • Opcode Fuzzy Hash: 67d08dbc0940362a2426628aaf294a1f5071dccf166456d279230b1dcafd3661
              • Instruction Fuzzy Hash: 01F0F874D04208AFCB55DFACD445B9CBFF4EB48310F64C1A9985893345D635AA56DB80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.360227865.00000000031B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_31b0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7acadf228f24a7541df9fdb7617174a2fcb3a37cdb7f6c0c6644e4527953b581
              • Instruction ID: 88705c7d761ac47896b6cb1c104b91a9194efd69849892310312f0c2b5bf1d42
              • Opcode Fuzzy Hash: 7acadf228f24a7541df9fdb7617174a2fcb3a37cdb7f6c0c6644e4527953b581
              • Instruction Fuzzy Hash: F6E0C9353402149FD758DA39D845F5A7BA5EF89620F5180A5F5098B3A1DA71EC018B90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c545a3443b9fd2d7a6c42b621933005c0eef3b8f09d5e60d8fb9b4bf24180dc5
              • Instruction ID: 4ca5eb865e123bf2b62fbf147dda6309cd07aae86351665d6f848e4109f10c3c
              • Opcode Fuzzy Hash: c545a3443b9fd2d7a6c42b621933005c0eef3b8f09d5e60d8fb9b4bf24180dc5
              • Instruction Fuzzy Hash: 1CF0F875D0420DEFCB44EFA8D948AADBFF9FB48300F1081AAD819A3214D7305A94DB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5d0ff1fdf69fd4c93a29f66a915f26ee4f8f7eec7d73104fc3397a9a3d20cf56
              • Instruction ID: 257d8f99a2d42f2807e8b50b58acd6faa3e18be89e4f57989b1fe8a31ed7037b
              • Opcode Fuzzy Hash: 5d0ff1fdf69fd4c93a29f66a915f26ee4f8f7eec7d73104fc3397a9a3d20cf56
              • Instruction Fuzzy Hash: 18F0A034914388AFC711EB6CD854658BFF0AB45200F5480EEC848D7341E7319E01DB41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 74b27eed6329dcf7335fc38422cb9db5317264466680fe3bd526fb91bb7c4259
              • Instruction ID: a58f38469a3a3302c0ab96ae9b6d65956dc1c8f09bce234d7a1d236971a62444
              • Opcode Fuzzy Hash: 74b27eed6329dcf7335fc38422cb9db5317264466680fe3bd526fb91bb7c4259
              • Instruction Fuzzy Hash: D7F05870D01208EFCB54DFA8D881A9CBFB1EB58300F10C1EADC1493354D6365A11CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ae545e10c5051c22e5e4826fc1484882eecd6e1dd2903c2ad0547400c4fa5b76
              • Instruction ID: 931a10dff801e3a573bff6351dc40887240dfaad2f792f70d9cded68755e2336
              • Opcode Fuzzy Hash: ae545e10c5051c22e5e4826fc1484882eecd6e1dd2903c2ad0547400c4fa5b76
              • Instruction Fuzzy Hash: 57F0A774D00249AFCB14DF98D805BBDFFB1FB58320F608199E914A7394CB355691DB54
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ae7aa188cbdf5c702cd409ce4719e75c35cfffadd9bc4e8818d7958151e17e01
              • Instruction ID: e19a84cd52cff6d1cbcec8683385f5dc745f089e9f40444c76577ee9c48b6efb
              • Opcode Fuzzy Hash: ae7aa188cbdf5c702cd409ce4719e75c35cfffadd9bc4e8818d7958151e17e01
              • Instruction Fuzzy Hash: 55F05874D08248AFCB15DFA8D844A9CBFB0EB49300F10C0EADC48A3351E6359A15DF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d2498008865d0d42b8e3d4507a4b0472132b8e88806358cdd94ed77c429b8354
              • Instruction ID: 9979aa45e1438bb420c5dcd18a5e91fd3e888007f40c7119dba9d40b4fa9dd2d
              • Opcode Fuzzy Hash: d2498008865d0d42b8e3d4507a4b0472132b8e88806358cdd94ed77c429b8354
              • Instruction Fuzzy Hash: 29F07474D01219EFCB45EFA8D545AADBBF1FB08300F5085AAD818A7314D7719A51DF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c5989f4f53e67b141232ceeb2fd76be6d4c960292377d0097708957f04e8345e
              • Instruction ID: 32d4e5d2dc0089821e55947676ced9a5e971fd86d93d194c8fd2b606d31d5218
              • Opcode Fuzzy Hash: c5989f4f53e67b141232ceeb2fd76be6d4c960292377d0097708957f04e8345e
              • Instruction Fuzzy Hash: 08E0DFB281511DAFDB04FBA8D809B8B7BE9DF20310F6481E8D105C3214E9700B0082A2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 93578022f7806a56125e5c2fcfbe2f7a360d76a4ba1e17a9ce6b68721f8f9b59
              • Instruction ID: 460f5b62068746b3909c3079f71a3e182b001528d513553ccfa36d269f4a3b56
              • Opcode Fuzzy Hash: 93578022f7806a56125e5c2fcfbe2f7a360d76a4ba1e17a9ce6b68721f8f9b59
              • Instruction Fuzzy Hash: 54E01A78904208BBCB14DFA8DC46B69BFB4EB94310F64C0ADED4463354CA31EA56DA98
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0fd829f8dba36c2e75865572391242f305dfb44ef128fbfca363f2da0ec03e55
              • Instruction ID: 40151aa1cc57bcdb00632ab42ad5224e0a4b91e154dd11082ab761ad0450868d
              • Opcode Fuzzy Hash: 0fd829f8dba36c2e75865572391242f305dfb44ef128fbfca363f2da0ec03e55
              • Instruction Fuzzy Hash: E7F0B770A0422CCFDB54CF59D859BA9BBB6FB89301F4081ADE40AAB254D7755C81DB11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0cc386bb69ace73a379c8d0177a2ae367abcdb31ab0e51a147d63a5bff4b8acd
              • Instruction ID: f4c66a610a983303149dc3fb892100ead853e095f532c963390b749639921a68
              • Opcode Fuzzy Hash: 0cc386bb69ace73a379c8d0177a2ae367abcdb31ab0e51a147d63a5bff4b8acd
              • Instruction Fuzzy Hash: B0F0D434D05208FFCB55EFA8D944A9DBBB0EB48310F14C4AEE848A3244D631AA56DF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2bda88e71c800377459ed1775fdf639c7913ce85848b6587b6122200d1919991
              • Instruction ID: 7c5204c407e978d32db35b26df833eb2896176e7b4687c776378259f180523f9
              • Opcode Fuzzy Hash: 2bda88e71c800377459ed1775fdf639c7913ce85848b6587b6122200d1919991
              • Instruction Fuzzy Hash: 8AF0EC355482849FC712DF54D95556CBF30EB86300F58C0DDD8845B396D6319956E750
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8d8ecd716893f9c3b06f865c291805d0b6a725d9b3a6561b163ae3b9a73b359c
              • Instruction ID: 6aebbf208c892a45270c88293620cd9defae35ccfa2eca44c121961caa5a6167
              • Opcode Fuzzy Hash: 8d8ecd716893f9c3b06f865c291805d0b6a725d9b3a6561b163ae3b9a73b359c
              • Instruction Fuzzy Hash: 7AF03070D05348AFC750DFA8D84569DBBF0EB88310F24C0EAD81893344E6319E42DF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 88128f221d9a05544855e02c51f8586f2a4d83a194796ed1daa709a9a5b4d8fb
              • Instruction ID: 065ea0e557aa211a3e75809f0c328166af8511af963f289ee555cfe0bda0d486
              • Opcode Fuzzy Hash: 88128f221d9a05544855e02c51f8586f2a4d83a194796ed1daa709a9a5b4d8fb
              • Instruction Fuzzy Hash: CCF01575D00608EFCB44EFA8D885B9DBFF1EB58300F14C0A99818A3345E736AA51DB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 32448e1e0cdf83f987cd94bbb55090feef30b7454a30a295f341b5de925af368
              • Instruction ID: 6342073a3ddff7c6025dbd3290dde613b98b740cf5afadc305c3c8bf64939520
              • Opcode Fuzzy Hash: 32448e1e0cdf83f987cd94bbb55090feef30b7454a30a295f341b5de925af368
              • Instruction Fuzzy Hash: D8E09A3190620CEFCB41EBBCE848A5A7FF8EB09780F0000DAD409E3224EA301E54AB52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3b839816064a88a6ca0bd625c052d3e7b5ec8a79c09fca069e896b093c0d7315
              • Instruction ID: 1eea17167c48aa69aff60c73f2915ac1b98bdc93f98bc717ff0ea39de2dc71f6
              • Opcode Fuzzy Hash: 3b839816064a88a6ca0bd625c052d3e7b5ec8a79c09fca069e896b093c0d7315
              • Instruction Fuzzy Hash: 9AF01C74E0120CAFCB54EFA8D444AADBBB5EB88310F5080A9A904A3344DA345A50CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f2806a49bae815f68289ff0ae7a0a4ad7f156b4a5089a6d2b8eb902058f84dbc
              • Instruction ID: 1f26fe596d227bcaa5265a1795e99036ac3262f74fe3fc8e9357e8535095a82f
              • Opcode Fuzzy Hash: f2806a49bae815f68289ff0ae7a0a4ad7f156b4a5089a6d2b8eb902058f84dbc
              • Instruction Fuzzy Hash: 86F0A478A042189FC791DB58D894BAAB7F6FB8C300F1080D4E80DA3355DB34AE858F90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ec7dfbc99ddce4bb9cac3caf31b634b2bb07e32a020429de6e7a8ee6f7b3aff0
              • Instruction ID: 23f03437ff2633ac77e59e98f9d69523b7a94a962217bb15548f43c6f32c5893
              • Opcode Fuzzy Hash: ec7dfbc99ddce4bb9cac3caf31b634b2bb07e32a020429de6e7a8ee6f7b3aff0
              • Instruction Fuzzy Hash: 40E04F3280510AFACB09FBB8C846B5E7BF8DB18640F4440A5960AD3214DD7556549692
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a355e98332463879ca3135260e014cb071dc7cac3e813af220615e45699c2e28
              • Instruction ID: 9d245888fdc20b494cdae39428b7cd7936ad4396a1631ba5d6ec03ddde7565b3
              • Opcode Fuzzy Hash: a355e98332463879ca3135260e014cb071dc7cac3e813af220615e45699c2e28
              • Instruction Fuzzy Hash: CDE06D74915298AFCB05CFA8C900AACBFB1EB5A310F14C2DAD86893351C6359A12DF51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0921f750fda59f9b5322d605c02330221976c9cffa52abb4a3ced8a48d873411
              • Instruction ID: 93f87cedd7daf937fd5dc4e9d3fc6c8e303684fb760201c279e7eaaa038d5143
              • Opcode Fuzzy Hash: 0921f750fda59f9b5322d605c02330221976c9cffa52abb4a3ced8a48d873411
              • Instruction Fuzzy Hash: 76F0F274D042289FDB84EFA8D8456AEBBF4FB48300F5081AAD818A3358DB756A41CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 615a31e85d9852c957d866708893d49645b79ff9d27604e90e1d495ee75903bc
              • Instruction ID: a421ae2a31437a0ccdb7e6ac46572b0130347033f562d68a46edd2171b1e7e95
              • Opcode Fuzzy Hash: 615a31e85d9852c957d866708893d49645b79ff9d27604e90e1d495ee75903bc
              • Instruction Fuzzy Hash: 57E06D34C09248BFCB54EBA8D851BACFFB4EB49310F58C0EAD85457344C635AA42DB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5655714db338ced73415a9e1aea161e2094d1cfd7268bad1575d7bb410906a06
              • Instruction ID: da95611011b8ce29c4c37617676873a4dcb3a1a9910334abd8b3b65ae4862989
              • Opcode Fuzzy Hash: 5655714db338ced73415a9e1aea161e2094d1cfd7268bad1575d7bb410906a06
              • Instruction Fuzzy Hash: 66E0CD73D051449FC714AAD5F8063787E16D746361F4404DAE909E7730D52AD4105392
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 526e42d0427f8be678b0d235892047f39b9859e71e6c1bc31a69359892e04b26
              • Instruction ID: 70c1ac291b76cd5cdd7705401d464f0e06d1a219e6f7b37aedaf658d19b14d24
              • Opcode Fuzzy Hash: 526e42d0427f8be678b0d235892047f39b9859e71e6c1bc31a69359892e04b26
              • Instruction Fuzzy Hash: 23F0C974E04218EFCB94EFA8D844AADBFF4EB48310F14C0AAE858D3344D635AA51DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 24118be5a1c68a46d7468d11e4884bf7cfc00f6245ab394974a06fbe230e3696
              • Instruction ID: 63139bc8dfe869c1193cfde47b5448f9a84c39d8cfe963083674fd4bc166ea81
              • Opcode Fuzzy Hash: 24118be5a1c68a46d7468d11e4884bf7cfc00f6245ab394974a06fbe230e3696
              • Instruction Fuzzy Hash: 7AE09275D11208DFCB08FFA8E88579CBBB5EB04214F6045A9D804D3344E6359A40C740
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bad6f8449cf3d2c08f09b05aab27fc99312de50597a7dcc23973aeb97bda6528
              • Instruction ID: 4fa3ec1c4ceae06397fb2557b1f53e3aa61a169b3ef755ccb120b8b8c8c5f7f7
              • Opcode Fuzzy Hash: bad6f8449cf3d2c08f09b05aab27fc99312de50597a7dcc23973aeb97bda6528
              • Instruction Fuzzy Hash: 17F06574E11308EFC740EFA8D4446ADBFF5EB48300F1081A9D80593344EB355A80CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2e3f5f52c1a6c694f374d57473587b6fb4faa8d6d203e2c659280077f434fa69
              • Instruction ID: 6fb3bf46a1ce5a238f73ef714e72bacd5b63d7fb9f6a975e0a04fc7e179210e3
              • Opcode Fuzzy Hash: 2e3f5f52c1a6c694f374d57473587b6fb4faa8d6d203e2c659280077f434fa69
              • Instruction Fuzzy Hash: 0FE0DF75D04208EBCB08EF94D849B5CFF70EB50310F54C0ADD808A3346CA31AA52DF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3f5ae30c4249c4537a2eb110462d8409573769d7dae563cba5e73413c091d2a8
              • Instruction ID: 703271ffff5b64c2ced65ed2d1a17d96da7dac061d837765efa15c0b8a239466
              • Opcode Fuzzy Hash: 3f5ae30c4249c4537a2eb110462d8409573769d7dae563cba5e73413c091d2a8
              • Instruction Fuzzy Hash: 55E0C934D04208AFCB54DFA8D98579CBBF5EB48300F54C1AA9808A3344D636AA45CF41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 594c438930bf5b5c5d7a1ccc5a91c5983bb2625b3939b2b8f2b670e96b4359e8
              • Instruction ID: 6c21770390cd2dd6a59ddf158f50e70ea94db287cf84ae1716ccd3c8031f615c
              • Opcode Fuzzy Hash: 594c438930bf5b5c5d7a1ccc5a91c5983bb2625b3939b2b8f2b670e96b4359e8
              • Instruction Fuzzy Hash: DDF0A578D00208EFCB54EFA8D844A9CBBB1EB48310F10C0AAA81893354D631AA51DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e165d264ebe2c405e4de00e0c78f4d23d8e1c717a2fe7d27ac23952e3c16044
              • Instruction ID: a24cb88e4014de8fd33533ceb251cb4f138e0492e9a7cbe7c7fc266c62f9c005
              • Opcode Fuzzy Hash: 3e165d264ebe2c405e4de00e0c78f4d23d8e1c717a2fe7d27ac23952e3c16044
              • Instruction Fuzzy Hash: A0E0ED74E04208EFCB54EFA8D845AADFBF0EB48310F14C0A9D918E3344D631AA51DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: acfeeae8682b99a03c0f6be13496c5eabe0e5c9a28c1c8937b6cd3c755ccb1f4
              • Instruction ID: 24f6978ecd84e892bf4ff54f1c6639ed1e8448e1b79370d946890cb3a09dd986
              • Opcode Fuzzy Hash: acfeeae8682b99a03c0f6be13496c5eabe0e5c9a28c1c8937b6cd3c755ccb1f4
              • Instruction Fuzzy Hash: 24F08C38E0C2998FCB41CB58D894AE87FF2FF49200F0540FAD14CAB662CA3059668B02
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 02a2600b8071e0b7b666ade513a2dfe45bf0fc5657b76cd5d375ed607675b3a3
              • Instruction ID: 44ae8b31c4d84b6c393223b37c4bbbfa68a0424d85de9329c583b326e41f1dd3
              • Opcode Fuzzy Hash: 02a2600b8071e0b7b666ade513a2dfe45bf0fc5657b76cd5d375ed607675b3a3
              • Instruction Fuzzy Hash: 02F01C74900249AFCB55DFA8C845BA9FBF0FB45320F2482EAD86857396C6315692DB44
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7b7f8465598dd33bd17fc13a45b26027e6fdda63920946395c1e96bbd19a0ba4
              • Instruction ID: c7083fca6cf7feefc5542b666397bdb475c9d83d76aa4315915c084c5d28aad4
              • Opcode Fuzzy Hash: 7b7f8465598dd33bd17fc13a45b26027e6fdda63920946395c1e96bbd19a0ba4
              • Instruction Fuzzy Hash: 6FE0DF3280A108EFCB12EBF8C645AAE7BF0EB16700F4440AAC105C3124DA304A08CB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8280d9d8710cffbb4fd4c715dc4ec879defc8c5eddd1b49e71b859abccc30076
              • Instruction ID: c47b9ea356a24bbe0b9fa411cc1eea3eaf1d129b181504ecf03e09d321d7d1ff
              • Opcode Fuzzy Hash: 8280d9d8710cffbb4fd4c715dc4ec879defc8c5eddd1b49e71b859abccc30076
              • Instruction Fuzzy Hash: 2EE0E574D002449FC704DBA8D840758FFF1EB05314F2482CDC85897395C6329A43CB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aa9b9f631a3da0f698e67445906f5f1fcee67cca0fd5cdd3c5c80147da64acd7
              • Instruction ID: c96358cfbc69a963d0567b204ff1439b7226023092d18bd22625e386ef749c17
              • Opcode Fuzzy Hash: aa9b9f631a3da0f698e67445906f5f1fcee67cca0fd5cdd3c5c80147da64acd7
              • Instruction Fuzzy Hash: 21E06D7091A288EFCB02EBA8E95966DBFB4EB05200B1440DAD905AB251DA711E44D751
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e9fa7dc0663173f5473e45e02b524986dd0c231f68c6d144664e4c7c8c142890
              • Instruction ID: 46c96672ad32dc7666dbb1944068dea2ee33dfbc194243ee90f68ddde796b574
              • Opcode Fuzzy Hash: e9fa7dc0663173f5473e45e02b524986dd0c231f68c6d144664e4c7c8c142890
              • Instruction Fuzzy Hash: 9BF0C934D01208EFCB54EFA8D844A9CFBB1FB48310F10C1AAEC1893354D631AA51DF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d91465dc72d75dbae7cf1ff11aadd0aa342fce42621173e7ee8882fa4e794b2
              • Instruction ID: f774f28b34ce44ba5a09ab9574805799fe6ce3c19eeec6d8ac33a7cbc8946730
              • Opcode Fuzzy Hash: 9d91465dc72d75dbae7cf1ff11aadd0aa342fce42621173e7ee8882fa4e794b2
              • Instruction Fuzzy Hash: 22E09A34905108ABCB20DAA8D89ABACBF70EB45300F2481A9C80867348DB326A02CA81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 40c8b12cc01b913cb8edc15ec2373ad0e0692f0a66bf64ceaf594b76a61031c4
              • Instruction ID: 4610d669f44bd2f6c5477b59f0c295bc3eda1c229c1cf840e7b3a533c6c33dfb
              • Opcode Fuzzy Hash: 40c8b12cc01b913cb8edc15ec2373ad0e0692f0a66bf64ceaf594b76a61031c4
              • Instruction Fuzzy Hash: F6E0ED74D04208EFCB54DFA8D444A9CFBF0EB48310F10C0A9D81893344D631AA51DF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 50b339e2ff429584d47e961c58e0e4526d5934b173ad799f12f52c0d44a0d658
              • Instruction ID: 8a2ca9730dab30cf8ffb0ea6f6bdcd0ed1f2200bb142f9a4460e3f856670e465
              • Opcode Fuzzy Hash: 50b339e2ff429584d47e961c58e0e4526d5934b173ad799f12f52c0d44a0d658
              • Instruction Fuzzy Hash: CAF01C7890821DCFDB54CF88E494B7EBBB6FB48300F104058D519A7245CB78DD868F90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe46e805b04c9da1ecbf0d97d22b700e0391e8303738dcb7b4a116a7ebf3b58f
              • Instruction ID: 2fe40b758af17d1f8eb206e27bcc9090f766bb2dccf22a281960aaae565b6621
              • Opcode Fuzzy Hash: fe46e805b04c9da1ecbf0d97d22b700e0391e8303738dcb7b4a116a7ebf3b58f
              • Instruction Fuzzy Hash: C1E0ED75E001699FCB90CB98D840AEDBBF5FB88351F1080A6E54DD7354CA3069958F51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8095a57ddc1deb543c51038a22c1d70c089d02f3001cdf6a6e334ec941ce9f38
              • Instruction ID: 84b6adf7a0849564c8ce6b4db10c377290316691592692c83de3c74229a578a1
              • Opcode Fuzzy Hash: 8095a57ddc1deb543c51038a22c1d70c089d02f3001cdf6a6e334ec941ce9f38
              • Instruction Fuzzy Hash: FCE0ED749092A88BCF28DB24C084BBD7AFABB4D245F149455940A67241CA704982CB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f935bbd9a5e6609dc62a84eab5458a29b07348993cd6086df58e5346df26d23f
              • Instruction ID: cc534d96da30834c874de5d8bbe9dc8a9934973e990f80cfbd6a59cbc7683671
              • Opcode Fuzzy Hash: f935bbd9a5e6609dc62a84eab5458a29b07348993cd6086df58e5346df26d23f
              • Instruction Fuzzy Hash: 37E04F39904208ABC704DBA8D99579DBB75EB45314F6480DDD80863344C6329B42CB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 195e7e2cfaa3c75f711c84f5cd79244efca9e611cf0af9e2816ae2dd809b881e
              • Instruction ID: f30717ea6a8d3075461f426a7aa4eeb19aead3d7db0850400689aae579896f3d
              • Opcode Fuzzy Hash: 195e7e2cfaa3c75f711c84f5cd79244efca9e611cf0af9e2816ae2dd809b881e
              • Instruction Fuzzy Hash: 28E0ED74D04208EFCB44EFA8D94565CBBF4EB48304F54C0E9981893344D6359A41CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 30475012cdd0dcaef598b787c2ef169c2d522173f8946877b3dd9094e2a83fce
              • Instruction ID: 06ae703978bbdc8bd494e2c5825d8bd21366a75a4b8daf97e5fdd6e574f0c2b2
              • Opcode Fuzzy Hash: 30475012cdd0dcaef598b787c2ef169c2d522173f8946877b3dd9094e2a83fce
              • Instruction Fuzzy Hash: D3F0D474901228CFCB90CF68D848BACBBB2FB48311F4042A9E00AAB251DB759CC5DF01
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 13ec4e95391e02faa889a88fe53aad849e0eb90d47b7a8b0ab9267a2a38f7d2b
              • Instruction ID: 81d38a9b07c485c0c4d96b218468ce11368d7984cbee41c1c385061b8d72fe14
              • Opcode Fuzzy Hash: 13ec4e95391e02faa889a88fe53aad849e0eb90d47b7a8b0ab9267a2a38f7d2b
              • Instruction Fuzzy Hash: EBE0E574E00208EFCB54EFA8D844A9CFBF1EB48310F10C1AAD818A3344D631AA51DF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 13ec4e95391e02faa889a88fe53aad849e0eb90d47b7a8b0ab9267a2a38f7d2b
              • Instruction ID: dc494a030d2eb5637e3cc0d960b518303a538a35df50f01c1a6c9e1c48c31725
              • Opcode Fuzzy Hash: 13ec4e95391e02faa889a88fe53aad849e0eb90d47b7a8b0ab9267a2a38f7d2b
              • Instruction Fuzzy Hash: 86E0E574E00208EFCB54EFA8D884A9CFFF0EB48310F10C0AAD818A3344D632AA51DF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27163907227e134c86cdecc9a1ad48b26a16ad140e0b6bca6edccbb93facfb6e
              • Instruction ID: 43a41aa07baf2737cd6e3f1cc184cbfe3e2a91e599e2da6bcda7768a6c8a0505
              • Opcode Fuzzy Hash: 27163907227e134c86cdecc9a1ad48b26a16ad140e0b6bca6edccbb93facfb6e
              • Instruction Fuzzy Hash: 7BE0E534E00208EFCB44EFA8D484A9DBBF0EB48300F20C0AA981893344D632AA42CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 350325acdb77494b5120d721352a6c70fe952bfbe583fe089045dc06152ebfc8
              • Instruction ID: 07e40c58690ff58d3480f06e96f6dcfd351279701c7cb5a592adcc7744bcfb43
              • Opcode Fuzzy Hash: 350325acdb77494b5120d721352a6c70fe952bfbe583fe089045dc06152ebfc8
              • Instruction Fuzzy Hash: B7E06D71D09284DFCB05DFA4D848A59BF70EB96300F14C1EEDC441B255CA315A55C755
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27163907227e134c86cdecc9a1ad48b26a16ad140e0b6bca6edccbb93facfb6e
              • Instruction ID: c92708e9a00234ab54d24f3fc9f6263d066dce38e27d34e830865d786b167acb
              • Opcode Fuzzy Hash: 27163907227e134c86cdecc9a1ad48b26a16ad140e0b6bca6edccbb93facfb6e
              • Instruction Fuzzy Hash: 99E01A34E00208EFCB44EFA8D444AACFBF0EB48300F10C0EAD81893344D632AA42CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: becf0faff567724f6a20b61d18e88b508bbe769b70a0368d10f4b3acd315e8fb
              • Instruction ID: c8ec851565b27579a168f5db85bea83adc9a977e9f409fd6cd9e42676937f93b
              • Opcode Fuzzy Hash: becf0faff567724f6a20b61d18e88b508bbe769b70a0368d10f4b3acd315e8fb
              • Instruction Fuzzy Hash: DDE0C27280120DFFCB10FBB8C848A5EBFB8DB20740F8840E9D101D3554EE711B50A7A2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction ID: 0da8c491eb1d2dc417e7b5edadacbfc34a6fc51e45949adae7cfb82ca4702ed8
              • Opcode Fuzzy Hash: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction Fuzzy Hash: 15E0E534E00208EFCB44EFA8D84569CBBF0EB48300F50C0EA980893344D635AA42CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction ID: 98874092bdce07816cac1daa61d9e1a7f9769264654efd557053a2e71442d1e4
              • Opcode Fuzzy Hash: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction Fuzzy Hash: A3E0E534E00208EFCB44EFA8D44569CBBF0EB48300F50C0EA9818A3344D635AA42CF81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction ID: 06a9e0027c62a28acd37c4fdf575f1059369d78b527415b84693a85a7553b534
              • Opcode Fuzzy Hash: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction Fuzzy Hash: ABE0E574E00208EFCB54EFA8D44469CBBF0EB48300F50C0EA981893344D631AA42DF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0084d6f6785c32849d69bb1c77751efd6b9e83966d05133f7bcbd525c738e543
              • Instruction ID: bc68222716f974ffca10ad000dc64d5f87a6bd67577eb0a00d44e2380d00b407
              • Opcode Fuzzy Hash: 0084d6f6785c32849d69bb1c77751efd6b9e83966d05133f7bcbd525c738e543
              • Instruction Fuzzy Hash: 90E02B72C00108EBC300EA88D851BA6BB78D706310F54C0DDD90493780DB33AE02C7C1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction ID: 3907b25de64849d3ed25fd5e6a04ca0d520968626b77c206aecbd7bc48b06066
              • Opcode Fuzzy Hash: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction Fuzzy Hash: 09E0E534E00208EFCB44EFA8D44469CBBF4EB48300F10C1EA981893344D631AA42DF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction ID: 5af87ac4c1f38206631d8266b254f4c4e259ae3a63e10fad866f296bffbb7938
              • Opcode Fuzzy Hash: fe82bd91b48d8cd8c3f226cfc9a574ea1f1fa33fc946252658da2d285aa66dab
              • Instruction Fuzzy Hash: 55E0E534E00208EFCB44EFA8D48469CBBF0EB48300F10C1EA980893344D632AA42CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f3251004ff35b9b58dd4f903b579e082f6ce84a08f1c06129b57ba6116514250
              • Instruction ID: bad6d01070adf06268442fbd68f1628206e6968f16cd9675937fcfcbb52ee790
              • Opcode Fuzzy Hash: f3251004ff35b9b58dd4f903b579e082f6ce84a08f1c06129b57ba6116514250
              • Instruction Fuzzy Hash: 43E0E534D04208EFCB18EF98D945AADFFB0EB58310F14C0AAE844A3385C631AA51EB95
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4b60b3b449ac7a4931316fae241d5eb37d420ad19fc02675231b445ff81208f9
              • Instruction ID: 36769b5b65412d9fcf4f05985b8f864b0c580f18c98d12d3d8ee75ea3b9801e8
              • Opcode Fuzzy Hash: 4b60b3b449ac7a4931316fae241d5eb37d420ad19fc02675231b445ff81208f9
              • Instruction Fuzzy Hash: 93E0823280620DEACB11EBA88848A9E7BE8EB04A10F8440A9C10283124EEB00A549A92
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 49bc1c1c9c456b098c916fc03969332bd000f5b0a82a48d0e71a8e1ff45e4894
              • Instruction ID: fecc5cadbecc9a6e62e8bf1b88d4e397d391ec6f2201634dcee94e99ae92f1fe
              • Opcode Fuzzy Hash: 49bc1c1c9c456b098c916fc03969332bd000f5b0a82a48d0e71a8e1ff45e4894
              • Instruction Fuzzy Hash: 1DE01A39A112199FDB50CF48DD44ADCBBB1FF88311F1401E1E60DA7214CB306E948F80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b1cb20b5911b62d9d460d6626e9b3563d318490d427da47ce07b6173d7e2116f
              • Instruction ID: f8657192448ff67592b81aef148490941faebab41c30fa07d8fe4a0c1d308770
              • Opcode Fuzzy Hash: b1cb20b5911b62d9d460d6626e9b3563d318490d427da47ce07b6173d7e2116f
              • Instruction Fuzzy Hash: 07E0C23180220DEFCB15FBB8C405A5E7BF8EB00700F4440A5C106C3114DE710B10D793
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e35fd3659436e3513f3bbc8e5000f471274edb78491740bbe311e4e072cfabea
              • Instruction ID: 93c46f74a64ea7434695cdb9aa014b278ee77364f6eb73fbd51462d5c774925a
              • Opcode Fuzzy Hash: e35fd3659436e3513f3bbc8e5000f471274edb78491740bbe311e4e072cfabea
              • Instruction Fuzzy Hash: 38E08C3280520DEACB10EBA8C408A9E7BA8DB00600F5040E5810583114DE700A109792
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 14a4c782346fe5856bf7794b296f15f9e994909917d723d7d1d4fde1cfa94156
              • Instruction ID: 9c4fdfd62ec9425cdb599bb1607207002c0fdf47b662a3b0ad7da181d164e821
              • Opcode Fuzzy Hash: 14a4c782346fe5856bf7794b296f15f9e994909917d723d7d1d4fde1cfa94156
              • Instruction Fuzzy Hash: 78E0C27280120DFBCB10FBB9D404A5E7FA8DB00700F1440E9D501D3114DE710B109792
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9ee51eb994dc1126b057ac3d2773ed6e0dae52f804ea4fd14f45601099d30deb
              • Instruction ID: 410a5c1b199d947dc67d2b4822efba840583ddd15bc7f2f1e9389170e80fa449
              • Opcode Fuzzy Hash: 9ee51eb994dc1126b057ac3d2773ed6e0dae52f804ea4fd14f45601099d30deb
              • Instruction Fuzzy Hash: D2E0C23180120DEFCB10FBB8C848A5E7FB8DB10740F8040E9C101C3154EE711B50A792
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 32aa49c63eb5817c818c4a30af2134e6396cfb5ce506073b96d1868e75d524c9
              • Instruction ID: d6d428d2662a46c973bf3d24c84e68b795f4c3f821ed01e2e44f3176d45e0047
              • Opcode Fuzzy Hash: 32aa49c63eb5817c818c4a30af2134e6396cfb5ce506073b96d1868e75d524c9
              • Instruction Fuzzy Hash: 3DE0B674E0420CAFCB44EFA8E44549DBFF5EB89304F0085E9E809E7390EA396A458F81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9317b4634f7ca5d46f29a4fe3bf574c869b4ae26488c198cca226b35fc5396b7
              • Instruction ID: eca5ab1136db80907b4d9faa2a39d20637196300cd7f48d65077e6e9a342d8b5
              • Opcode Fuzzy Hash: 9317b4634f7ca5d46f29a4fe3bf574c869b4ae26488c198cca226b35fc5396b7
              • Instruction Fuzzy Hash: 22E0C27180220DEBCB11FBB8D808A5E7FB8EB04700F4040E9C505E3214DE700F149792
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 722ad089826628862fe3d4839de6b6abad40166c733f75b2f2175ee7b31e1f15
              • Instruction ID: 09987e27d7cfe3f618b9d37c034922329bf689a1a91353a41fb21f2cb43fe9bc
              • Opcode Fuzzy Hash: 722ad089826628862fe3d4839de6b6abad40166c733f75b2f2175ee7b31e1f15
              • Instruction Fuzzy Hash: D2E01A34D04208EFCB14DF98D444AACFFB0EB48310F14C0EADC4463344C631AA51DB85
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a1f83951f8cbdeeddd03ab18dd0b4df1320d8a3fc3ac9ec07c74a70d12bfe44b
              • Instruction ID: 6b1fde356b0aa02898da90509c0b5e87686e19a517b44647d66abf66a8bbd06a
              • Opcode Fuzzy Hash: a1f83951f8cbdeeddd03ab18dd0b4df1320d8a3fc3ac9ec07c74a70d12bfe44b
              • Instruction Fuzzy Hash: 92E01D34D11358DFCB55EFB8E55565DBBF5EB44301F6041E9C80493344DB319A51CB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62c4365ac8f6c69b8587dcf5603ca28f85bb00a975db74822418d8f5a2e61a60
              • Instruction ID: 63e959779f2b783f2425413a9010bbbcd09ba9b78a527e47cc000f0522b51359
              • Opcode Fuzzy Hash: 62c4365ac8f6c69b8587dcf5603ca28f85bb00a975db74822418d8f5a2e61a60
              • Instruction Fuzzy Hash: F3E08C34904208EBCB08EF98E844A6CBFB4EB85310F20C0A9DC0423344CA32AA52DB94
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 88274fa8ab007d3cd3f2fcc96aab4869697951ded04aaa47ac1ed812a428b0bc
              • Instruction ID: 9ab3fd46843b68eda02ea17a5b8c1b4cc41a442f5c67e376ea688640d463bbd7
              • Opcode Fuzzy Hash: 88274fa8ab007d3cd3f2fcc96aab4869697951ded04aaa47ac1ed812a428b0bc
              • Instruction Fuzzy Hash: 2EE01A74A001298FCB50DB88D884AEDBBB6FB88314F0041A2D509E7244CB306D558B40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62c4365ac8f6c69b8587dcf5603ca28f85bb00a975db74822418d8f5a2e61a60
              • Instruction ID: 00ead5f9e107ff911376ba607fac5966bc7b6ac87e6d143e7f80ee8b8b900bed
              • Opcode Fuzzy Hash: 62c4365ac8f6c69b8587dcf5603ca28f85bb00a975db74822418d8f5a2e61a60
              • Instruction Fuzzy Hash: 14E08C34904208EBCB08EF98E844A6CFFB4EB54310F24C0ADDC4423344CB32AA92DB84
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 506a3890925215c29f06bf0bd6bdc6fc2d00de67591c908a80137127f88c9390
              • Instruction ID: 6148fa4fc6cc29ffba2d6b15dfb2aed2909171008436394a178f132577a52ac1
              • Opcode Fuzzy Hash: 506a3890925215c29f06bf0bd6bdc6fc2d00de67591c908a80137127f88c9390
              • Instruction Fuzzy Hash: 88E0BF34D05208EFCB04EF98D555A5CFBB4EB44314F54C1EAD81857344D6316A56CB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9b8cb130b07434b26f1b6fb03ee2bbb9eb8c382e164defa3a61e7771e007b0b9
              • Instruction ID: 4a32be7fa4c824bb750fbfb9cd1514e4c88d914c77377cb018b15d1811c63c00
              • Opcode Fuzzy Hash: 9b8cb130b07434b26f1b6fb03ee2bbb9eb8c382e164defa3a61e7771e007b0b9
              • Instruction Fuzzy Hash: B8F0C978A04168CFDB90CF58D884BAABBF1FB48300F004095D409A7354DB349D858F61
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b5fe1bf9ef62ce42b20f4897fa2e5575ed1210f894ad233940394602c7702da9
              • Instruction ID: 4a32be7fa4c824bb750fbfb9cd1514e4c88d914c77377cb018b15d1811c63c00
              • Opcode Fuzzy Hash: b5fe1bf9ef62ce42b20f4897fa2e5575ed1210f894ad233940394602c7702da9
              • Instruction Fuzzy Hash: B8F0C978A04168CFDB90CF58D884BAABBF1FB48300F004095D409A7354DB349D858F61
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1c82f329f1f0cb7e08c22acb221ac1ab9d2a7dd27e22cd01a9701e63686f08a3
              • Instruction ID: 6a287861ec6321f139d06bff228692458a27211b280f543d16e8066e1e746696
              • Opcode Fuzzy Hash: 1c82f329f1f0cb7e08c22acb221ac1ab9d2a7dd27e22cd01a9701e63686f08a3
              • Instruction Fuzzy Hash: 8CE0BF34911208EFC754EFA8D55565CBBF4EB44214F6480EDDC0893344D6319A51CB41
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a7436821c728409c971e8bbe30741f92b13f081573f5eba21f859c9dcd706646
              • Instruction ID: 99bea06610c6ed53799a60655b291287ab17f37550ebbd3a0769de6534384372
              • Opcode Fuzzy Hash: a7436821c728409c971e8bbe30741f92b13f081573f5eba21f859c9dcd706646
              • Instruction Fuzzy Hash: 15E0127490122CCFCB00CF54D548BB97BB3FB85301F4000ADE10A97284CB759C95DB00
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ef48172b6eef0c17fe171eefcf954fe313daae1e7b08d5c03772a947600fc9f6
              • Instruction ID: f92e95096648440193d040536b8e1e2d8725153fa2ad4c203d7fb127ef784762
              • Opcode Fuzzy Hash: ef48172b6eef0c17fe171eefcf954fe313daae1e7b08d5c03772a947600fc9f6
              • Instruction Fuzzy Hash: A8E08C34904208EBCB08EF98E844A6CFF70FB44310F20C1ADDC0427344CA32AA52DB84
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 840cd258d67c76a0cfcc5898eb428ffa20f6ab4b934b08d37295bae1a75bfccf
              • Instruction ID: 518b298457ff932cede6063c6f038027dd92ab1df1f13f108db44cc75e001173
              • Opcode Fuzzy Hash: 840cd258d67c76a0cfcc5898eb428ffa20f6ab4b934b08d37295bae1a75bfccf
              • Instruction Fuzzy Hash: A9E09A3091861DCFCB00DF68C904BE9BBB2FB89300F0041D9C0486B219EF34AE898F90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9422624bfeda04b21ae3bf7950c871e5e24569738af4a488c30d30d57378d3a
              • Instruction ID: c11da54ba1547d9e688f754d351f4a1b4c81d175dc49b9c1b2ead8eb6e464aa5
              • Opcode Fuzzy Hash: f9422624bfeda04b21ae3bf7950c871e5e24569738af4a488c30d30d57378d3a
              • Instruction Fuzzy Hash: F6E04E78A052688FDBA0CF58D958BA9BBF5FB58304F0080D5E409A7354DB74AE898F60
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9579fef93b5fe1f4153510d22c67aa37f1c343579708430e093d47d33b353c8d
              • Instruction ID: b8353608ca52882a9ce834bb0ef4244aadaf357260ea6b11eff6d29e02b59122
              • Opcode Fuzzy Hash: 9579fef93b5fe1f4153510d22c67aa37f1c343579708430e093d47d33b353c8d
              • Instruction Fuzzy Hash: 40E01234905208EBC714EF98E99596DFF74EB45314F64C1DDD80517344CA32AE52DB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e430ad1451807aab650cef952fb1ce9d1733caebd47024d2f5aeb4372a01076a
              • Instruction ID: 31c29b621a84818d106ea366a0981f24e4a04c54c2f54f531aab1cbde443dfef
              • Opcode Fuzzy Hash: e430ad1451807aab650cef952fb1ce9d1733caebd47024d2f5aeb4372a01076a
              • Instruction Fuzzy Hash: 16E0C230912208FBCB01EFA8E809A6DBBF9EB04300F5044A9D80993304DA311E40DB51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6bf925df4e7dfd292ae56d91c8aba4b219f2fd0a0ef189dfc11da803a73ceecd
              • Instruction ID: 3a7739130e992c7c6c8fd7a8942d6c9f115058a9bc5406e7651f34bb0fed3f69
              • Opcode Fuzzy Hash: 6bf925df4e7dfd292ae56d91c8aba4b219f2fd0a0ef189dfc11da803a73ceecd
              • Instruction Fuzzy Hash: 1FE02B34514148EBC719DB94D541A6CBF71EB55314F64C0CCDC0807355CA33AD53C640
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9579fef93b5fe1f4153510d22c67aa37f1c343579708430e093d47d33b353c8d
              • Instruction ID: 77b3c6776022116f14d01cd09297b136357cfee87fd870ce9195eadc1085749a
              • Opcode Fuzzy Hash: 9579fef93b5fe1f4153510d22c67aa37f1c343579708430e093d47d33b353c8d
              • Instruction Fuzzy Hash: 50E01234905208EBC714EF98E95596DBF74EB45314F64C1EDD80817344CA326E52DB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9579fef93b5fe1f4153510d22c67aa37f1c343579708430e093d47d33b353c8d
              • Instruction ID: 269a5465915901f5d86deffb660adf74cd8172603fa59f6774a622f2b9a678c2
              • Opcode Fuzzy Hash: 9579fef93b5fe1f4153510d22c67aa37f1c343579708430e093d47d33b353c8d
              • Instruction Fuzzy Hash: B6E0C234904208EBCB04EF98E855A6CFF70EB41300F60C0DDCC0817344CA326E42CB80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3878882c65b8a89271a79b502937953ea88c9c23959972c2d63b8a1b433ac362
              • Instruction ID: 7095b69847837f9aa007d154b929f41ef8f1139e4c7ab3650b36c03bf20e81e1
              • Opcode Fuzzy Hash: 3878882c65b8a89271a79b502937953ea88c9c23959972c2d63b8a1b433ac362
              • Instruction Fuzzy Hash: 3FD0A930905208EBC704EB98E854E2ABBA8EB42314F64C0DDD80843344CB33AE02CB80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 17dc321fa29a5d1c8bfa6c84925d88d9cfcba5247c98a08fca65802b3c6090a7
              • Instruction ID: 6989466fb73115f83da64d68aa866c5e175e7a3187424ac2c5b9080c552c1373
              • Opcode Fuzzy Hash: 17dc321fa29a5d1c8bfa6c84925d88d9cfcba5247c98a08fca65802b3c6090a7
              • Instruction Fuzzy Hash: 84D0C574E09309CFDF54DFA9D099AACBFF6AF49210F6080199419AB246D6345485CF11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 84375945e76a27e90e439fc643025ec2ebd6784f84dd1f3c6256460a1f10398b
              • Instruction ID: 1da8b22722cf47a077c45d94d0284b70ee715fc10aac65d194cfc9f77e17f3ed
              • Opcode Fuzzy Hash: 84375945e76a27e90e439fc643025ec2ebd6784f84dd1f3c6256460a1f10398b
              • Instruction Fuzzy Hash: C3D0C931105118CFE7059F34E81DA68BF36FF84306F109164A0076B165CB741C40DB54
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a93b42dbe489ad30971bf9fed8bfb6d56f7a7ffb7f960b15ba96182d18630a27
              • Instruction ID: ecf305c335a7d9c1f65fbd6523a282d1ab5c28dc03cccb4ae6ed1c1cda62f27b
              • Opcode Fuzzy Hash: a93b42dbe489ad30971bf9fed8bfb6d56f7a7ffb7f960b15ba96182d18630a27
              • Instruction Fuzzy Hash: F4B0927090530CAF8610DA99980181ABBACDA0A218F0006D9E90897710D93AA91056E2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.375958304.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a90000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 17bdb59076d3426a177797a23512b944ac57e49905870aed60a5c99387972b3d
              • Instruction ID: cdb7e917bf69aff0c30c4d4ad0aeb4492ad694311654626f82f7ab7e3c357a63
              • Opcode Fuzzy Hash: 17bdb59076d3426a177797a23512b944ac57e49905870aed60a5c99387972b3d
              • Instruction Fuzzy Hash: 23C02B3160D2810FF7138620D8077123F3087A3340F0982DF6F82C82ABEA509419C273
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: UUUU
              • API String ID: 0-1798160573
              • Opcode ID: a1c0af514cfbd7c91dd86d0b44f53f16e9839cdc072ca405038ceeef350933bc
              • Instruction ID: aebd05288fda5213e82faaa3b54b3541956ab3119769123a69408ff0fe0408ba
              • Opcode Fuzzy Hash: a1c0af514cfbd7c91dd86d0b44f53f16e9839cdc072ca405038ceeef350933bc
              • Instruction Fuzzy Hash: 16A17C71E046598FDB54CFE9C980A9DFBF2BF88304F248569D419EB209E734A946CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.360136077.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1890000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID: ]
              • API String ID: 0-3352871620
              • Opcode ID: ad4474c6b685ec9924816aef0c3175c96d507d7e21fdcd9bf90efe345c31bb32
              • Instruction ID: a29313c16281a4bb07fe6fbbd4cbaa94903f4066ef7cb69c4a65e2dbc5471742
              • Opcode Fuzzy Hash: ad4474c6b685ec9924816aef0c3175c96d507d7e21fdcd9bf90efe345c31bb32
              • Instruction Fuzzy Hash: A0515F71D056698BEB68CF1B8D4479AFAF7AFC8340F08C1FA940CA6654DB700A869F51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373465880.00000000057C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_57c0000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 033416a0c74194f94de74f28cf50ca063afdebff9e781b447486dc683447350a
              • Instruction ID: ea6c383940fb3ba22bcd2a6e04e997bf6cd3139f639a5d1093ca1f5635862d43
              • Opcode Fuzzy Hash: 033416a0c74194f94de74f28cf50ca063afdebff9e781b447486dc683447350a
              • Instruction Fuzzy Hash: 46910774E052088FCB41DFA9E584AAEBBF6FB8C300F109569D418AB755DB74AD46CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.360136077.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1890000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0fd24cfe76dc6f8dd3e0ce9c10024b0b4a2b5be55e0576654b2b34d3d3904880
              • Instruction ID: 99dfc8a0a5674142f23e3ffea5ccbdd302a58934142ecc36fb041c04609b0751
              • Opcode Fuzzy Hash: 0fd24cfe76dc6f8dd3e0ce9c10024b0b4a2b5be55e0576654b2b34d3d3904880
              • Instruction Fuzzy Hash: 32611F709016498BE748DFAAE8446A9BBF7FFCC304F05D429D4099B268EF7919468B60
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.360136077.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1890000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 823a9d4f7058c8f2c0f0909db07098f0c62b21ec594cc7b02ff6f4f36d1876fd
              • Instruction ID: 135762ba7589b513e6f59e5f60b0058e4c46ee0bfb9fa3a8eb144ba78cc7ba98
              • Opcode Fuzzy Hash: 823a9d4f7058c8f2c0f0909db07098f0c62b21ec594cc7b02ff6f4f36d1876fd
              • Instruction Fuzzy Hash: 3B515271D016598BEB6CCF2B8D44799FAF7AFC8340F04C1FA940DA6668DB741A829F50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.360136077.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1890000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f5bf80943b49ab4023502350de7f770ce9dfe366b5f19ab9e698d6225614e376
              • Instruction ID: 8c23f934fa59d2d74e00fadc583f5b86f333c692dd05476e53fbfa57e8a93816
              • Opcode Fuzzy Hash: f5bf80943b49ab4023502350de7f770ce9dfe366b5f19ab9e698d6225614e376
              • Instruction Fuzzy Hash: 8041CEB4D002489FDF15CFA9D984A9EBFF1BB49314F24902AE414BB350E7749985CF85
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a69c084b1ac5100b83ee516edadaf2e305362034fdca105cbdf3e51599248c3f
              • Instruction ID: 2e3dca8e0f6944a2c008dc387867b8361f2c2bb68e7fc5aa0a9de1427e1f395f
              • Opcode Fuzzy Hash: a69c084b1ac5100b83ee516edadaf2e305362034fdca105cbdf3e51599248c3f
              • Instruction Fuzzy Hash: 58619AB1808399CEDF21CFA9C44D39EBFF1BB19318F14850AD459A7281C3B86284DF62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RtlDecodePointer.NTDLL ref: 057547CC
              • RtlDecodePointer.NTDLL ref: 0575480B
              • RtlEncodePointer.NTDLL(00000000), ref: 05754872
              • RtlDecodePointer.NTDLL(00000000), ref: 057548AE
              • RtlEncodePointer.NTDLL(00000000), ref: 057548E8
              • RtlDecodePointer.NTDLL ref: 05754928
              • RtlDecodePointer.NTDLL ref: 05754966
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Pointer$Decode$Encode
              • String ID:
              • API String ID: 1638560559-0
              • Opcode ID: c6df1f9870a6b3cab853e88f6346b3d139c87eac11fc8cfed0c6d77ffbc19492
              • Instruction ID: 1b46d8509f3b62762ad2841d2633aba125ec61dea6dd7fcc2bb953a73e35172a
              • Opcode Fuzzy Hash: c6df1f9870a6b3cab853e88f6346b3d139c87eac11fc8cfed0c6d77ffbc19492
              • Instruction Fuzzy Hash: 9B6118B1C04359CEDF21CFAAC54939EBFF1BB18329F14851AD859A7680C7B82584DF61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RtlDecodePointer.NTDLL ref: 057547CC
              • RtlDecodePointer.NTDLL ref: 0575480B
              • RtlEncodePointer.NTDLL(00000000), ref: 05754872
              • RtlDecodePointer.NTDLL(00000000), ref: 057548AE
              • RtlEncodePointer.NTDLL(00000000), ref: 057548E8
              • RtlDecodePointer.NTDLL ref: 05754928
              • RtlDecodePointer.NTDLL ref: 05754966
              Memory Dump Source
              • Source File: 00000000.00000002.373443329.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5750000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Pointer$Decode$Encode
              • String ID:
              • API String ID: 1638560559-0
              • Opcode ID: 8b8600279dd2117c1c59b57af94b06b97d4a5ee2ad95ef2d45ef1abb13894587
              • Instruction ID: 106e556dcaee0e872ffab5855788cacccc06280ec602b9dd5ded6d2b64eb5586
              • Opcode Fuzzy Hash: 8b8600279dd2117c1c59b57af94b06b97d4a5ee2ad95ef2d45ef1abb13894587
              • Instruction Fuzzy Hash: 126137B1C04399CEDF21CFAAC44939EBFF1BB18329F14851AD859A7680D3B82184DF61
              Uniqueness

              Uniqueness Score: -1.00%

              Execution Graph

              Execution Coverage:11.8%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:0.6%
              Total number of Nodes:523
              Total number of Limit Nodes:36
              execution_graph 28887 6e03180 28888 6e031ce GetSystemTimes 28887->28888 28889 6e0320b 28888->28889 28466 512e190 28467 512e1ea 28466->28467 28471 512e29f 28467->28471 28472 5122750 28467->28472 28469 512e253 GetCurrentThreadId 28469->28471 28473 5122760 28472->28473 28474 512279d 28473->28474 28477 5125d3a 28473->28477 28505 5125d48 28473->28505 28474->28469 28478 5125d81 28477->28478 28483 5125e1f 28478->28483 28533 2b6e0f0 28478->28533 28542 2b6e0d8 28478->28542 28482 5125e95 28570 5125604 28482->28570 28550 51255f4 28483->28550 28487 5125ec4 28488 5122750 6 API calls 28487->28488 28491 5125fb4 28487->28491 28489 5125f4c 28488->28489 28581 5125654 28489->28581 28596 512cd49 28491->28596 28600 512cd58 28491->28600 28492 512601b 28493 5125f5b 28493->28491 28494 5125654 CreateWindowExW 28493->28494 28495 5125f86 28494->28495 28495->28491 28496 5125654 CreateWindowExW 28495->28496 28497 5125f97 28496->28497 28586 5125674 28497->28586 28499 5125fa6 28593 5121540 28499->28593 28507 5125d81 28505->28507 28506 51255f4 6 API calls 28508 5125e8b 28506->28508 28511 5125e1f 28507->28511 28529 2b6e0f0 3 API calls 28507->28529 28530 2b6e0d8 3 API calls 28507->28530 28509 5125120 6 API calls 28508->28509 28510 5125e95 28509->28510 28512 5125604 6 API calls 28510->28512 28511->28506 28513 5125e9d 28512->28513 28514 5125614 6 API calls 28513->28514 28515 5125ec4 28513->28515 28514->28515 28516 5122750 6 API calls 28515->28516 28519 5125fb4 28515->28519 28517 5125f4c 28516->28517 28518 5125654 CreateWindowExW 28517->28518 28521 5125f5b 28518->28521 28531 512cd58 6 API calls 28519->28531 28532 512cd49 6 API calls 28519->28532 28520 512601b 28521->28519 28522 5125654 CreateWindowExW 28521->28522 28523 5125f86 28522->28523 28523->28519 28524 5125654 CreateWindowExW 28523->28524 28525 5125f97 28524->28525 28526 5125674 6 API calls 28525->28526 28527 5125fa6 28526->28527 28528 5121540 SendMessageW 28527->28528 28528->28519 28529->28511 28530->28511 28531->28520 28532->28520 28535 2b6e213 28533->28535 28536 2b6e121 28533->28536 28534 2b6e12d 28534->28483 28535->28483 28536->28534 28537 2b6e16e 28536->28537 28604 2b6e438 28536->28604 28607 2b6e428 28536->28607 28610 2b6ee00 28537->28610 28614 2b6edef 28537->28614 28544 2b6e0f0 28542->28544 28543 2b6e12d 28543->28483 28544->28543 28545 2b6e16e 28544->28545 28548 2b6e438 2 API calls 28544->28548 28549 2b6e428 2 API calls 28544->28549 28546 2b6ee00 CreateWindowExW 28545->28546 28547 2b6edef CreateWindowExW 28545->28547 28546->28543 28547->28543 28548->28545 28549->28545 28551 51255ff 28550->28551 28552 5129cd8 28551->28552 28553 5125654 CreateWindowExW 28551->28553 28555 5125e8b 28551->28555 28554 5122750 6 API calls 28552->28554 28553->28552 28554->28555 28556 5125120 28555->28556 28561 512512b 28556->28561 28557 5129f98 28557->28482 28558 5129f11 28559 5129f4a 28558->28559 28562 5125674 6 API calls 28558->28562 28560 5125674 6 API calls 28559->28560 28563 5129f56 28560->28563 28561->28557 28561->28558 28567 5129f64 28561->28567 28649 5129704 6 API calls 28561->28649 28564 5129f3c 28562->28564 28566 5129714 6 API calls 28563->28566 28643 5129714 28564->28643 28566->28567 28567->28557 28569 5122750 6 API calls 28567->28569 28569->28557 28571 512560f 28570->28571 28572 5125e9d 28571->28572 28573 5122750 6 API calls 28571->28573 28572->28487 28576 5125614 28572->28576 28574 512bd1c 28573->28574 28653 512a570 28574->28653 28578 512561f 28576->28578 28577 512c096 28577->28487 28578->28577 28579 5122750 6 API calls 28578->28579 28580 512c166 28579->28580 28580->28487 28583 512565f 28581->28583 28582 5129d9b 28582->28493 28583->28582 28584 2b6ee00 CreateWindowExW 28583->28584 28585 2b6edef CreateWindowExW 28583->28585 28584->28582 28585->28582 28588 512567f 28586->28588 28587 512bbde 28587->28499 28588->28587 28589 5122750 6 API calls 28588->28589 28590 512bc38 28589->28590 28591 512a548 SendMessageW 28590->28591 28592 512bc49 28591->28592 28592->28499 28594 512c3d8 SendMessageW 28593->28594 28595 512c444 28594->28595 28595->28491 28597 512cd58 28596->28597 28598 5125604 6 API calls 28597->28598 28599 512cd6c 28598->28599 28599->28492 28601 512cd65 28600->28601 28602 5125604 6 API calls 28601->28602 28603 512cd6c 28602->28603 28603->28492 28618 2b693e8 28604->28618 28606 2b6e441 28606->28537 28608 2b693e8 2 API calls 28607->28608 28609 2b6e441 28607->28609 28608->28609 28609->28537 28611 2b6ee2a 28610->28611 28612 2b6eed1 28611->28612 28638 2b6fb61 28611->28638 28615 2b6ee2a 28614->28615 28616 2b6eed1 28615->28616 28617 2b6fb61 CreateWindowExW 28615->28617 28617->28616 28619 2b693fb 28618->28619 28620 2b69413 28619->28620 28626 2b69670 28619->28626 28630 2b69660 28619->28630 28620->28606 28621 2b6940b 28621->28620 28622 2b69610 GetModuleHandleW 28621->28622 28623 2b6963d 28622->28623 28623->28606 28627 2b69684 28626->28627 28628 2b696a9 28627->28628 28634 2b68768 28627->28634 28628->28621 28631 2b69684 28630->28631 28632 2b696a9 28631->28632 28633 2b68768 LoadLibraryExW 28631->28633 28632->28621 28633->28632 28635 2b69850 LoadLibraryExW 28634->28635 28637 2b698c9 28635->28637 28637->28628 28639 2b6fbec CreateWindowExW 28638->28639 28640 2b6fb8a 28638->28640 28642 2b6fd1c 28639->28642 28640->28612 28644 512971f 28643->28644 28645 5122750 6 API calls 28644->28645 28646 512bc38 28645->28646 28650 512a548 28646->28650 28649->28558 28651 512bc60 SendMessageW 28650->28651 28652 512bc49 28651->28652 28652->28559 28654 512a57b 28653->28654 28657 5125830 28654->28657 28656 512be04 28656->28572 28659 512583b 28657->28659 28658 5128fcc 28658->28656 28659->28658 28660 5122750 6 API calls 28659->28660 28661 5128dec 28660->28661 28661->28658 28662 5125604 6 API calls 28661->28662 28662->28658 28663 2b692f0 28665 2b693e8 2 API calls 28663->28665 28664 2b692ff 28665->28664 28890 2b6b6d0 GetCurrentProcess 28891 2b6b743 28890->28891 28892 2b6b74a GetCurrentThread 28890->28892 28891->28892 28893 2b6b787 GetCurrentProcess 28892->28893 28894 2b6b780 28892->28894 28895 2b6b7bd 28893->28895 28894->28893 28896 2b6b7e5 GetCurrentThreadId 28895->28896 28897 2b6b816 28896->28897 28898 512e3fb 28899 512e40e 28898->28899 28900 5122750 6 API calls 28898->28900 28901 51232d8 PostMessageW 28899->28901 28900->28899 28902 512e431 28901->28902 28666 51225d8 28667 51225e8 28666->28667 28671 5128898 28667->28671 28677 5128888 28667->28677 28668 5122611 28672 51288cd 28671->28672 28683 5123660 28672->28683 28676 5128929 28676->28668 28678 51288cd 28677->28678 28679 5123660 7 API calls 28678->28679 28680 5128922 28679->28680 28681 5127240 6 API calls 28680->28681 28682 5128929 28681->28682 28682->28668 28689 512368c 28683->28689 28685 5123a87 28697 5127240 28685->28697 28686 51238bc 28686->28685 28687 5122750 6 API calls 28686->28687 28688 5123a64 28687->28688 28713 51232d8 28688->28713 28689->28686 28707 5123238 28689->28707 28691 512373d 28692 5122750 6 API calls 28691->28692 28694 51237e5 28691->28694 28693 51237af 28692->28693 28695 5122750 6 API calls 28693->28695 28696 5122750 6 API calls 28694->28696 28695->28694 28696->28686 28698 512724b 28697->28698 28699 5128ac5 28698->28699 28700 5128a8d 28698->28700 28706 5128a94 28698->28706 28702 5128b16 28699->28702 28703 5128aea 28699->28703 28701 5122750 6 API calls 28700->28701 28701->28706 28705 5122750 6 API calls 28702->28705 28704 5122750 6 API calls 28703->28704 28704->28706 28705->28706 28706->28676 28708 5123243 28707->28708 28710 5122750 6 API calls 28708->28710 28711 5123bf7 28708->28711 28712 5123bb9 28708->28712 28709 5122750 6 API calls 28709->28712 28710->28712 28711->28691 28712->28709 28712->28711 28714 512e6e0 PostMessageW 28713->28714 28715 512e74c 28714->28715 28715->28685 28716 512c4d8 28717 5122750 6 API calls 28716->28717 28718 512c4e8 28717->28718 28903 512a0f8 28904 512a109 28903->28904 28907 512a173 28904->28907 28908 5129788 28904->28908 28909 5129793 28908->28909 28910 512a16c 28909->28910 28912 512b889 28909->28912 28913 512b8b2 28912->28913 28914 512b8bf 28913->28914 28915 512b8e8 CreateIconFromResourceEx 28913->28915 28914->28910 28916 512b966 28915->28916 28916->28910 28917 2b63f98 28918 2b63fa9 28917->28918 28922 51249e1 28918->28922 28927 51249a8 28918->28927 28919 2b63fbb 28923 51249ab 28922->28923 28924 51249ef 28922->28924 28931 512353c 28923->28931 28924->28919 28928 51249ab 28927->28928 28929 512353c 13 API calls 28928->28929 28930 51249da 28929->28930 28930->28919 28932 5123547 28931->28932 28935 512357c 28932->28935 28934 5124aed 28937 5123587 28935->28937 28936 5125374 28938 5125383 28936->28938 28940 5124f1c OleInitialize 28936->28940 28944 512521e 28937->28944 28945 51253ae 28937->28945 28948 5124ee4 28937->28948 28938->28945 28953 5124f1c 28938->28953 28939 5124ee4 10 API calls 28939->28936 28940->28938 28942 512539b 28942->28945 28957 512f5e8 28942->28957 28961 512f5f8 28942->28961 28944->28936 28944->28939 28945->28934 28949 5124eef 28948->28949 28965 51259a8 28949->28965 28980 51259c8 28949->28980 28950 51255ab 28950->28944 28955 5124f27 28953->28955 28954 512f091 28954->28942 28955->28954 29026 512dc44 28955->29026 28959 512f65d 28957->28959 28958 512fac0 WaitMessage 28958->28959 28959->28958 28960 512f6aa 28959->28960 28960->28945 28962 512f65d 28961->28962 28963 512fac0 WaitMessage 28962->28963 28964 512f6aa 28962->28964 28963->28962 28964->28945 28969 51259ad 28965->28969 28966 5125a02 28966->28950 28967 5125b42 28970 5125b3d 28967->28970 28975 5122750 6 API calls 28967->28975 28968 5125adf 28971 5125aed 28968->28971 28995 2b6c3e0 28968->28995 29004 2b6c3d1 28968->29004 28969->28966 28969->28967 28969->28968 28970->28950 28971->28970 28972 5122750 6 API calls 28971->28972 28973 5125b15 28972->28973 29013 51250d4 28973->29013 28976 5125be7 28975->28976 28976->28970 28977 5125120 6 API calls 28976->28977 28977->28970 28982 51259ee 28980->28982 28981 5125a02 28981->28950 28982->28981 28983 5125adf 28982->28983 28989 5125b42 28982->28989 28984 5125aed 28983->28984 28993 2b6c3e0 8 API calls 28983->28993 28994 2b6c3d1 8 API calls 28983->28994 28985 5122750 6 API calls 28984->28985 28988 5125b3d 28984->28988 28986 5125b15 28985->28986 28987 51250d4 SendMessageW 28986->28987 28987->28988 28988->28950 28989->28988 28990 5122750 6 API calls 28989->28990 28991 5125be7 28990->28991 28991->28988 28992 5125120 6 API calls 28991->28992 28992->28988 28993->28984 28994->28984 28996 2b6c40e 28995->28996 28998 2b6c437 28996->28998 29001 2b6c4df 28996->29001 29016 2b6b9a0 28996->29016 28998->29001 29002 5122750 6 API calls 28998->29002 29020 5122740 28998->29020 28999 2b6c486 29000 2b6c4da KiUserCallbackDispatcher 28999->29000 29000->29001 29002->28999 29005 2b6c3e0 29004->29005 29006 2b6b9a0 GetFocus 29005->29006 29007 2b6c437 29005->29007 29010 2b6c4df 29005->29010 29006->29007 29007->29010 29011 5122750 6 API calls 29007->29011 29012 5122740 6 API calls 29007->29012 29008 2b6c486 29009 2b6c4da KiUserCallbackDispatcher 29008->29009 29009->29010 29011->29008 29012->29008 29014 512d240 SendMessageW 29013->29014 29015 512d2ac 29014->29015 29015->28970 29017 2b6b9ab 29016->29017 29019 2b6c9f5 29017->29019 29025 2b6ba14 GetFocus 29017->29025 29019->28998 29021 5122760 29020->29021 29022 512279d 29021->29022 29023 5125d3a 6 API calls 29021->29023 29024 5125d48 6 API calls 29021->29024 29022->28999 29023->29022 29024->29022 29025->29019 29027 512dc4f 29026->29027 29028 512f3ab 29027->29028 29030 512dc60 29027->29030 29028->28954 29031 512f3e0 OleInitialize 29030->29031 29032 512f444 29031->29032 29032->29028 29033 2b66758 29036 2b66344 29033->29036 29035 2b66766 29037 2b6634f 29036->29037 29040 2b66394 29037->29040 29039 2b6688d 29039->29035 29041 2b6639f 29040->29041 29044 2b663c4 29041->29044 29043 2b66962 29043->29039 29045 2b663cf 29044->29045 29048 2b663f4 29045->29048 29047 2b66a62 29047->29043 29049 2b663ff 29048->29049 29050 2b671bc 29049->29050 29052 2b6b406 29049->29052 29050->29047 29053 2b6b429 29052->29053 29054 2b6b44d 29053->29054 29057 2b6b5b8 29053->29057 29061 2b6b5aa 29053->29061 29054->29050 29059 2b6b5c5 29057->29059 29058 2b6b5ff 29058->29054 29059->29058 29065 2b6a0ec 29059->29065 29063 2b6b5c5 29061->29063 29062 2b6b5ff 29062->29054 29063->29062 29064 2b6a0ec 9 API calls 29063->29064 29064->29062 29066 2b6a0f7 29065->29066 29068 2b6c2f8 29066->29068 29069 2b6b904 29066->29069 29070 2b6b90f 29069->29070 29071 2b6c367 29070->29071 29072 2b663f4 9 API calls 29070->29072 29075 2b6c3e0 8 API calls 29071->29075 29076 2b6c3d1 8 API calls 29071->29076 29072->29071 29073 2b6c375 29077 2b6e0f0 3 API calls 29073->29077 29078 2b6e0d8 3 API calls 29073->29078 29074 2b6c3a0 29074->29068 29075->29073 29076->29073 29077->29074 29078->29074 28719 5124180 28720 51241a7 28719->28720 28722 5124284 28720->28722 28723 5123474 28720->28723 28724 5124600 CreateActCtxA 28723->28724 28726 51246c3 28724->28726 28727 5123904 28728 512390d 28727->28728 28730 512392b 28727->28730 28729 5122750 6 API calls 28728->28729 28728->28730 28729->28730 28731 5122750 6 API calls 28730->28731 28734 5123a87 28730->28734 28732 5123a64 28731->28732 28733 51232d8 PostMessageW 28732->28733 28733->28734 29079 2b6fe40 SetWindowLongW 29080 2b6feac 29079->29080 29081 2b6bdc1 29082 2b6bd87 DuplicateHandle 29081->29082 29084 2b6bdcf 29081->29084 29083 2b6bd96 29082->29083 28735 106d01c 28736 106d034 28735->28736 28737 106d08e 28736->28737 28740 5120bda 28736->28740 28745 5120be8 28736->28745 28741 5120c15 28740->28741 28742 5120c47 28741->28742 28750 5120d70 28741->28750 28755 5120d60 28741->28755 28746 5120c15 28745->28746 28747 5120c47 28746->28747 28748 5120d70 9 API calls 28746->28748 28749 5120d60 9 API calls 28746->28749 28748->28747 28749->28747 28752 5120d84 28750->28752 28751 5120e10 28751->28742 28760 5120e18 28752->28760 28765 5120e28 28752->28765 28757 5120d84 28755->28757 28756 5120e10 28756->28742 28758 5120e18 9 API calls 28757->28758 28759 5120e28 9 API calls 28757->28759 28758->28756 28759->28756 28761 5120e39 28760->28761 28770 5122440 28760->28770 28774 51262e8 28760->28774 28795 51262f8 28760->28795 28761->28751 28766 5120e39 28765->28766 28767 5122440 2 API calls 28765->28767 28768 51262f8 9 API calls 28765->28768 28769 51262e8 9 API calls 28765->28769 28766->28751 28767->28766 28768->28766 28769->28766 28816 5122470 28770->28816 28820 5122460 28770->28820 28771 512245a 28771->28761 28775 5126311 28774->28775 28785 512632d 28774->28785 28776 5126316 28775->28776 28777 5126358 28775->28777 28778 5126332 28776->28778 28779 512631b 28776->28779 28782 51265e4 28777->28782 28777->28785 28778->28785 28787 5126550 28778->28787 28788 51265ac 28778->28788 28792 512645e 28778->28792 28780 5126542 28779->28780 28781 5126324 28779->28781 28824 5125820 28780->28824 28781->28785 28786 51265ba 28781->28786 28836 51258d0 28782->28836 28785->28792 28842 5126a8a 28785->28842 28847 5126a88 28785->28847 28832 51258a0 28786->28832 28790 5125830 6 API calls 28787->28790 28828 5125890 28788->28828 28790->28792 28792->28761 28796 5126311 28795->28796 28806 512632d 28795->28806 28797 5126316 28796->28797 28798 5126358 28796->28798 28799 5126332 28797->28799 28800 512631b 28797->28800 28803 51265e4 28798->28803 28798->28806 28799->28806 28808 5126550 28799->28808 28809 51265ac 28799->28809 28813 512645e 28799->28813 28801 5126542 28800->28801 28802 5126324 28800->28802 28804 5125820 4 API calls 28801->28804 28802->28806 28807 51265ba 28802->28807 28805 51258d0 9 API calls 28803->28805 28804->28813 28805->28813 28806->28813 28814 5126a8a 4 API calls 28806->28814 28815 5126a88 4 API calls 28806->28815 28810 51258a0 4 API calls 28807->28810 28811 5125830 6 API calls 28808->28811 28812 5125890 4 API calls 28809->28812 28810->28813 28811->28813 28812->28813 28813->28761 28814->28813 28815->28813 28817 51224b2 28816->28817 28819 51224b9 28816->28819 28818 512250a CallWindowProcW 28817->28818 28817->28819 28818->28819 28819->28771 28821 51224b2 28820->28821 28823 51224b9 28820->28823 28822 512250a CallWindowProcW 28821->28822 28821->28823 28822->28823 28823->28771 28825 512582b 28824->28825 28826 5126a88 4 API calls 28825->28826 28827 5126c9e 28826->28827 28827->28792 28829 512589b 28828->28829 28830 5126a88 4 API calls 28829->28830 28831 512d30c 28830->28831 28831->28792 28833 51258ab 28832->28833 28834 5126a88 4 API calls 28833->28834 28835 5129a53 28833->28835 28834->28835 28835->28792 28837 51258db 28836->28837 28838 5128d68 28837->28838 28839 5125830 6 API calls 28837->28839 28840 5126a88 4 API calls 28838->28840 28839->28838 28841 5128d71 28840->28841 28841->28792 28843 5126a93 28842->28843 28844 5126a9a 28842->28844 28843->28792 28852 5126ab2 28844->28852 28845 5126aa0 28845->28792 28848 5126a93 28847->28848 28849 5126a9a 28847->28849 28848->28792 28851 5126ab2 4 API calls 28849->28851 28850 5126aa0 28850->28792 28851->28850 28853 5126ae8 28852->28853 28856 5126ac6 28852->28856 28854 51217e0 4 API calls 28853->28854 28859 5126aef 28854->28859 28855 5126ad4 28855->28845 28856->28855 28860 51217e0 28856->28860 28858 5126b10 28858->28845 28859->28845 28861 512182c 28860->28861 28862 5121c6b 28861->28862 28863 5121870 28861->28863 28864 512187d 28861->28864 28872 51211c8 28862->28872 28863->28864 28866 51221a5 GetFocus 28863->28866 28867 51221e6 28863->28867 28864->28858 28864->28864 28868 51221d2 28866->28868 28867->28864 28877 5126b28 28867->28877 28882 5126b18 28867->28882 28868->28867 28869 5121540 SendMessageW 28868->28869 28869->28868 28873 51211d3 28872->28873 28875 5126b18 2 API calls 28873->28875 28876 5126b28 2 API calls 28873->28876 28874 5128d3c 28874->28864 28875->28874 28876->28874 28878 5126b6e 28877->28878 28879 5126b91 28878->28879 28880 5122470 CallWindowProcW 28878->28880 28881 5122460 CallWindowProcW 28878->28881 28879->28864 28880->28879 28881->28879 28883 5126b6e 28882->28883 28884 5126b91 28883->28884 28885 5122470 CallWindowProcW 28883->28885 28886 5122460 CallWindowProcW 28883->28886 28884->28864 28885->28884 28886->28884

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 263 512f5f8-512f65b 264 512f68a-512f6a8 263->264 265 512f65d-512f687 263->265 270 512f6b1-512f6e8 264->270 271 512f6aa-512f6ac 264->271 265->264 275 512fb19 270->275 276 512f6ee-512f702 270->276 273 512fb6a-512fb7f 271->273 279 512fb1e-512fb34 275->279 277 512f731-512f750 276->277 278 512f704-512f72e 276->278 285 512f752-512f758 277->285 286 512f768-512f76a 277->286 278->277 279->273 290 512f75a 285->290 291 512f75c-512f75e 285->291 287 512f789-512f792 286->287 288 512f76c-512f784 286->288 292 512f79a-512f7a1 287->292 288->279 290->286 291->286 293 512f7a3-512f7a9 292->293 294 512f7ab-512f7b2 292->294 295 512f7bf-512f7dc call 512dcc0 293->295 296 512f7b4-512f7ba 294->296 297 512f7bc 294->297 300 512f7e2-512f7e9 295->300 301 512f931-512f935 295->301 296->295 297->295 300->275 304 512f7ef-512f82c 300->304 302 512fb04-512fb17 301->302 303 512f93b-512f93f 301->303 302->279 305 512f941-512f954 303->305 306 512f959-512f962 303->306 310 512f832-512f837 304->310 311 512fafa-512fafe 304->311 305->279 308 512f991-512f998 306->308 309 512f964-512f98e 306->309 312 512fa37-512fa4c 308->312 313 512f99e-512f9a5 308->313 309->308 316 512f869-512f87e call 512dce4 310->316 317 512f839-512f847 call 512dccc 310->317 311->292 311->302 312->311 327 512fa52-512fa54 312->327 314 512f9a7-512f9d1 313->314 315 512f9d4-512f9f6 313->315 314->315 315->312 353 512f9f8-512fa02 315->353 325 512f883-512f887 316->325 317->316 328 512f849-512f867 call 512dcd8 317->328 329 512f8f8-512f905 325->329 330 512f889-512f89b call 512dcf0 325->330 331 512faa1-512fabe call 512dcc0 327->331 332 512fa56-512fa8f 327->332 328->325 329->311 347 512f90b-512f915 call 512dd00 329->347 355 512f8db-512f8f3 330->355 356 512f89d-512f8cd 330->356 331->311 346 512fac0-512faec WaitMessage 331->346 343 512fa91-512fa97 332->343 344 512fa98-512fa9f 332->344 343->344 344->311 350 512faf3 346->350 351 512faee 346->351 360 512f917-512f91a call 512dd0c 347->360 361 512f924-512f92c call 512dd18 347->361 350->311 351->350 362 512fa04-512fa0a 353->362 363 512fa1a-512fa35 353->363 355->279 370 512f8d4 356->370 371 512f8cf 356->371 372 512f91f 360->372 361->311 367 512fa0e-512fa10 362->367 368 512fa0c 362->368 363->312 363->353 367->363 368->363 370->355 371->370 372->311
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 09ef247d920a1e4ab2609b024e566e1ce738fe0250c09f2fd06f63a3d835b567
              • Instruction ID: a571f05e218b05b777050847864986afac5a2167651f0d2421f24567ea689b75
              • Opcode Fuzzy Hash: 09ef247d920a1e4ab2609b024e566e1ce738fe0250c09f2fd06f63a3d835b567
              • Instruction Fuzzy Hash: 6EF17E34A00219CFDB14DFA9C995BADBBF2FF48304F158159E409AF2A5DB74A856CF80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetSystemTimes.KERNEL32(?,?,?), ref: 06E031FC
              Memory Dump Source
              • Source File: 00000003.00000002.579833918.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: true
              • Associated: 00000003.00000002.579753153.0000000006DF0000.00000004.08000000.00040000.00000000.sdmpDownload File
              • Associated: 00000003.00000002.579753153.0000000006DFE000.00000004.08000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_6df0000_WmtuqNHPM2.jbxd
              Yara matches
              Similarity
              • API ID: SystemTimes
              • String ID:
              • API String ID: 375623090-0
              • Opcode ID: 6108ffabc1b26138ab0aa8ecdf9924b2cf93f159a4c9ceb69c06bb20a700733c
              • Instruction ID: 22098267997159bcc6417e491de97cf58261ba56df1a649e0e538c529dfe1662
              • Opcode Fuzzy Hash: 6108ffabc1b26138ab0aa8ecdf9924b2cf93f159a4c9ceb69c06bb20a700733c
              • Instruction Fuzzy Hash: 1221F5B5C012199FCB50CF99D5847DEFBF4EF48310F24806AE808A7241D3789944CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • GetCurrentProcess.KERNEL32 ref: 02B6B730
              • GetCurrentThread.KERNEL32 ref: 02B6B76D
              • GetCurrentProcess.KERNEL32 ref: 02B6B7AA
              • GetCurrentThreadId.KERNEL32 ref: 02B6B803
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Current$ProcessThread
              • String ID:
              • API String ID: 2063062207-0
              • Opcode ID: f46f14a50ec5b63fbefff5e8ba23d7c608273199dbf3143f57c4f4cdb5882182
              • Instruction ID: e86bbf220a3a45b9977f1bd57607f3980df12cc7619816433680b817528b2fce
              • Opcode Fuzzy Hash: f46f14a50ec5b63fbefff5e8ba23d7c608273199dbf3143f57c4f4cdb5882182
              • Instruction Fuzzy Hash: 735155B5D006498FDB10CFAAC6887EEBBF1BF48308F20859AE059B7650D7789845CF65
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • GetCurrentProcess.KERNEL32 ref: 02B6B730
              • GetCurrentThread.KERNEL32 ref: 02B6B76D
              • GetCurrentProcess.KERNEL32 ref: 02B6B7AA
              • GetCurrentThreadId.KERNEL32 ref: 02B6B803
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Current$ProcessThread
              • String ID:
              • API String ID: 2063062207-0
              • Opcode ID: 61b411ea5f1523e1ad4722c341a53fff22ebedb7ae7a1bae9311431cef8ee937
              • Instruction ID: f852a61861dbe505872f0b16a0d0e941a6f5af536a6c243d6093898acbd2dd6a
              • Opcode Fuzzy Hash: 61b411ea5f1523e1ad4722c341a53fff22ebedb7ae7a1bae9311431cef8ee937
              • Instruction Fuzzy Hash: B15144B5D006498FDB10CFAAC648BEEBBF1BF48318F20859AE019B7650D7785884CF65
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6fbb8c5dc2f54119858f0d36e30e536920e2c18fc94e6c9f0d5303df3089de00
              • Instruction ID: a3a8217d3ec3877d08186aef144601dde8885c7b6a0a83f8071adce1aad63ebe
              • Opcode Fuzzy Hash: 6fbb8c5dc2f54119858f0d36e30e536920e2c18fc94e6c9f0d5303df3089de00
              • Instruction Fuzzy Hash: C522A278E04215DFCB24DF98D488ABEBBB2FF89310F658155D422A7355C734A8A1CF62
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 375 512e190-512e1f4 378 512e482-512e53d 375->378 379 512e1fa-512e212 call 512324c call 5123d48 375->379 406 512e543-512e54e 378->406 386 512e214-512e21a 379->386 387 512e22a-512e22c 379->387 391 512e21e-512e220 386->391 392 512e21c 386->392 388 512e22e-512e235 call 5123d70 387->388 389 512e23c-512e29d call 5122750 GetCurrentThreadId 387->389 388->389 402 512e2a6-512e2af 389->402 403 512e29f-512e2a5 389->403 391->387 392->387 404 512e2c0-512e2c6 402->404 405 512e2b1-512e2b7 402->405 403->402 408 512e2c8-512e2cd 404->408 409 512e2cf-512e315 404->409 405->404 407 512e2b9 405->407 411 512e550-512e556 406->411 412 512e557-512e56b 406->412 407->404 408->409 418 512e317 409->418 419 512e335-512e350 409->419 411->412 423 512e321-512e32d 418->423 421 512e352 419->421 422 512e35a-512e35b 419->422 421->422 422->378 423->419
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 0512E289
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CurrentThread
              • String ID:
              • API String ID: 2882836952-0
              • Opcode ID: 8576864a9d95c2fb1343b021f91c9200f7346a6acf13f5056a20d144dcf1bb54
              • Instruction ID: 0ed5dd07f07486caeb3c56c612803af78d4e26c99145de940bdf0e97ebc456b6
              • Opcode Fuzzy Hash: 8576864a9d95c2fb1343b021f91c9200f7346a6acf13f5056a20d144dcf1bb54
              • Instruction Fuzzy Hash: BB81AC71E002598FCB14DFA9C854AAEBFFAFF48300F24856AD416AB350DB749945CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 426 2b693e8-2b693fd call 2b68704 429 2b69413-2b69417 426->429 430 2b693ff 426->430 431 2b6942b-2b6946c 429->431 432 2b69419-2b69423 429->432 479 2b69405 call 2b69670 430->479 480 2b69405 call 2b69660 430->480 437 2b6946e-2b69476 431->437 438 2b69479-2b69487 431->438 432->431 433 2b6940b-2b6940d 433->429 435 2b69548-2b69608 433->435 474 2b69610-2b6963b GetModuleHandleW 435->474 475 2b6960a-2b6960d 435->475 437->438 440 2b694ab-2b694ad 438->440 441 2b69489-2b6948e 438->441 444 2b694b0-2b694b7 440->444 442 2b69490-2b69497 call 2b68710 441->442 443 2b69499 441->443 447 2b6949b-2b694a9 442->447 443->447 448 2b694c4-2b694cb 444->448 449 2b694b9-2b694c1 444->449 447->444 451 2b694cd-2b694d5 448->451 452 2b694d8-2b694e1 call 2b68720 448->452 449->448 451->452 456 2b694e3-2b694eb 452->456 457 2b694ee-2b694f3 452->457 456->457 459 2b694f5-2b694fc 457->459 460 2b69511-2b69515 457->460 459->460 461 2b694fe-2b6950e call 2b68730 call 2b68740 459->461 481 2b69518 call 2b69940 460->481 482 2b69518 call 2b69968 460->482 461->460 464 2b6951b-2b6951e 467 2b69520-2b6953e 464->467 468 2b69541-2b69547 464->468 467->468 476 2b69644-2b69658 474->476 477 2b6963d-2b69643 474->477 475->474 477->476 479->433 480->433 481->464 482->464
              APIs
              • GetModuleHandleW.KERNEL32(00000000), ref: 02B6962E
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: HandleModule
              • String ID:
              • API String ID: 4139908857-0
              • Opcode ID: 4e20d04236fe54c769949272758a089375afd2cf41e0b3063a21eee70a9a3b47
              • Instruction ID: 21ae4d41367326784e2f47f7ac5935df881b5d8c14e1ac9ec81466ae85dc469f
              • Opcode Fuzzy Hash: 4e20d04236fe54c769949272758a089375afd2cf41e0b3063a21eee70a9a3b47
              • Instruction Fuzzy Hash: D3711370A00B058FD764DF2AD45476ABBF1FF88314F148A6AD48ADBA50D738E849CF91
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 483 2b6fb61-2b6fb88 484 2b6fbec-2b6fc5e 483->484 485 2b6fb8a-2b6fbd8 call 2b6da04 483->485 486 2b6fc60-2b6fc66 484->486 487 2b6fc69-2b6fc70 484->487 491 2b6fbdd-2b6fbde 485->491 486->487 489 2b6fc72-2b6fc78 487->489 490 2b6fc7b-2b6fd1a CreateWindowExW 487->490 489->490 493 2b6fd23-2b6fd5b 490->493 494 2b6fd1c-2b6fd22 490->494 498 2b6fd5d-2b6fd60 493->498 499 2b6fd68 493->499 494->493 498->499 500 2b6fd69 499->500 500->500
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02B6FD0A
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CreateWindow
              • String ID:
              • API String ID: 716092398-0
              • Opcode ID: c70ee23d773a3f5de9c466a6e50ec1d63133b018d2876344aae4486c64f264f0
              • Instruction ID: 5cbfe61d55f8b627bd93e211b72925a1422f396b717805a4e10afa4b8a9557e7
              • Opcode Fuzzy Hash: c70ee23d773a3f5de9c466a6e50ec1d63133b018d2876344aae4486c64f264f0
              • Instruction Fuzzy Hash: 476128B1C04249AFCF05CF99D884ADDBFB2FF48314F28819AE809AB221D7359854CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 501 512e179-512e1f4 505 512e482-512e4b8 501->505 506 512e1fa-512e212 call 512324c call 5123d48 501->506 528 512e4c0-512e53d 505->528 513 512e214-512e21a 506->513 514 512e22a-512e22c 506->514 518 512e21e-512e220 513->518 519 512e21c 513->519 515 512e22e-512e235 call 5123d70 514->515 516 512e23c-512e29d call 5122750 GetCurrentThreadId 514->516 515->516 529 512e2a6-512e2af 516->529 530 512e29f-512e2a5 516->530 518->514 519->514 533 512e543-512e54e 528->533 531 512e2c0-512e2c6 529->531 532 512e2b1-512e2b7 529->532 530->529 535 512e2c8-512e2cd 531->535 536 512e2cf-512e315 531->536 532->531 534 512e2b9 532->534 538 512e550-512e556 533->538 539 512e557-512e56b 533->539 534->531 535->536 545 512e317 536->545 546 512e335-512e350 536->546 538->539 550 512e321-512e32d 545->550 548 512e352 546->548 549 512e35a-512e35b 546->549 548->549 549->505 550->546
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 0512E289
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CurrentThread
              • String ID:
              • API String ID: 2882836952-0
              • Opcode ID: b44c5345753df81194512eabd66e6e7af3104d0ae777436cc639523e2511b090
              • Instruction ID: 1c721a9bed47cfdb08cae9b9b8e1a5bf7f71296f31942e2d3c8b431d349e03c0
              • Opcode Fuzzy Hash: b44c5345753df81194512eabd66e6e7af3104d0ae777436cc639523e2511b090
              • Instruction Fuzzy Hash: C6519A71E002688FDF25DFA5C854AEEBBBABF44300F14866AE416AB250DB749855CF60
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 553 2b6fbf8-2b6fc5e 554 2b6fc60-2b6fc66 553->554 555 2b6fc69-2b6fc70 553->555 554->555 556 2b6fc72-2b6fc78 555->556 557 2b6fc7b-2b6fcb3 555->557 556->557 558 2b6fcbb-2b6fd1a CreateWindowExW 557->558 559 2b6fd23-2b6fd5b 558->559 560 2b6fd1c-2b6fd22 558->560 564 2b6fd5d-2b6fd60 559->564 565 2b6fd68 559->565 560->559 564->565 566 2b6fd69 565->566 566->566
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02B6FD0A
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CreateWindow
              • String ID:
              • API String ID: 716092398-0
              • Opcode ID: 75e743c7ff926ea284dc2e3d427b83991a496c7e28c63f474dbf2703e3e67ac0
              • Instruction ID: ab2e691d8944a48369ba6af669f0515731771214f80e3438b573536b979a89f2
              • Opcode Fuzzy Hash: 75e743c7ff926ea284dc2e3d427b83991a496c7e28c63f474dbf2703e3e67ac0
              • Instruction Fuzzy Hash: 5E41B2B1D003099FDF14CF99D884AEEBBB5FF48314F24816AE819AB210D774A945CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 567 5123474-51246c1 CreateActCtxA 570 51246c3-51246c9 567->570 571 51246ca-5124724 567->571 570->571 578 5124733-5124737 571->578 579 5124726-5124729 571->579 580 5124748 578->580 581 5124739-5124745 578->581 579->578 583 5124749 580->583 581->580 583->583
              APIs
              • CreateActCtxA.KERNEL32(?), ref: 051246B1
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: ad917e3f25bf9fec018c8355f00abb91174711eb8f127e7519405f6d4929a10b
              • Instruction ID: 2c200b57790a683a49407ff8210734bd52e5776e0d987b369ca8aa7bd7985ecb
              • Opcode Fuzzy Hash: ad917e3f25bf9fec018c8355f00abb91174711eb8f127e7519405f6d4929a10b
              • Instruction Fuzzy Hash: 7B41D171C00628CFDB24DFA9C884B9EBBF6BF49304F208099D409BB255DBB56985CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 584 51245f4-512467b 585 5124683-51246c1 CreateActCtxA 584->585 586 51246c3-51246c9 585->586 587 51246ca-5124724 585->587 586->587 594 5124733-5124737 587->594 595 5124726-5124729 587->595 596 5124748 594->596 597 5124739-5124745 594->597 595->594 599 5124749 596->599 597->596 599->599
              APIs
              • CreateActCtxA.KERNEL32(?), ref: 051246B1
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 9d686f2cddcedab3619e6d2dc28e6c424b2861744953599bc3aea55bd59fa38b
              • Instruction ID: 19d9d370c774296b0f7bef724c48d35d5600c534d0db56c7031188528b5968a4
              • Opcode Fuzzy Hash: 9d686f2cddcedab3619e6d2dc28e6c424b2861744953599bc3aea55bd59fa38b
              • Instruction Fuzzy Hash: 8041F271C00628CFDB24DFA9C884BCEBBF6BF59304F208199D409AB255DBB55985CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 600 5122470-51224ac 601 51224b2-51224b7 600->601 602 512255c-512257c 600->602 603 512250a-5122542 CallWindowProcW 601->603 604 51224b9-51224f0 601->604 608 512257f-512258c 602->608 606 5122544-512254a 603->606 607 512254b-512255a 603->607 610 51224f2-51224f8 604->610 611 51224f9-5122508 604->611 606->607 607->608 610->611 611->608
              APIs
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05122531
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CallProcWindow
              • String ID:
              • API String ID: 2714655100-0
              • Opcode ID: e13b1b8a19cf5b3615e0534877c132071d7c073a60acd080a5a0ae176adb9e1e
              • Instruction ID: d515933cd74f418ec41acf438974f1a26c959275dede8fa5697edea54b1293fa
              • Opcode Fuzzy Hash: e13b1b8a19cf5b3615e0534877c132071d7c073a60acd080a5a0ae176adb9e1e
              • Instruction Fuzzy Hash: 85411CB9A003158FCB14CF99C448AAEBBF6FF88314F24C499D519A7321D774A941CFA0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 614 512b889-512b8bd call 512a504 617 512b8d2-512b964 CreateIconFromResourceEx 614->617 618 512b8bf-512b8cf call 512b358 614->618 623 512b966-512b96c 617->623 624 512b96d-512b98a 617->624 623->624
              APIs
              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 0512B957
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CreateFromIconResource
              • String ID:
              • API String ID: 3668623891-0
              • Opcode ID: 85893b7a6d4e2d2802c4c49cfafea4ddc4d71946d188acad62f2b329fa7c6e30
              • Instruction ID: 49e6dc7ec160c45355f44a832909a411a95b53dc0f1d9934d5d6d5ac402f4f06
              • Opcode Fuzzy Hash: 85893b7a6d4e2d2802c4c49cfafea4ddc4d71946d188acad62f2b329fa7c6e30
              • Instruction Fuzzy Hash: 9E319EB2904359AFCB11CFA9D800AEEBFF8EF19310F18805AE554A7211C339A954DFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 627 2b6bdc1-2b6bdcd 628 2b6bd87-2b6bd94 DuplicateHandle 627->628 629 2b6bdcf-2b6bddb 627->629 630 2b6bd96-2b6bd9c 628->630 631 2b6bd9d-2b6bdba 628->631 632 2b6bde6-2b6beee 629->632 630->631
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B6BD87
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 649ab2cd8ccf9c1f926a6420b4d50752bac2bf484455d759bf937ea376d89587
              • Instruction ID: 8549a56273a2acafc008096fdcb93cf7656093059bc68dfc55aadaa3fff95c78
              • Opcode Fuzzy Hash: 649ab2cd8ccf9c1f926a6420b4d50752bac2bf484455d759bf937ea376d89587
              • Instruction Fuzzy Hash: 4B315038E80A40EFE705AB78E5457A93BB9E788345F204A29E9159F7CACB741950CF10
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 645 512e6b0-512e74a PostMessageW 647 512e753-512e774 645->647 648 512e74c-512e752 645->648 648->647
              APIs
              • PostMessageW.USER32(?,02B353E8,00000000,?), ref: 0512E73D
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessagePost
              • String ID:
              • API String ID: 410705778-0
              • Opcode ID: 28630efcf83c5af5dae2eee23424764f1165e87cae19c48e3f127bac71dbce95
              • Instruction ID: 8e932f882397a461f5dae0d0dc597c619675328823eecc70a3826ea9b46dc03d
              • Opcode Fuzzy Hash: 28630efcf83c5af5dae2eee23424764f1165e87cae19c48e3f127bac71dbce95
              • Instruction Fuzzy Hash: A8218CB68043498FDB10CF9AC8457DEBFF8EF18320F24845AD854A3601D378A949CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 650 2b6bcf9-2b6bd94 DuplicateHandle 652 2b6bd96-2b6bd9c 650->652 653 2b6bd9d-2b6bdba 650->653 652->653
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B6BD87
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: a516765c6f5cd9ea51f946cc0c8554a0e608b1209802906460c698f145558837
              • Instruction ID: 8887817c26705e07ec9d88b756a6aa91b11644286a36897a6f53f5d0bf28b39b
              • Opcode Fuzzy Hash: a516765c6f5cd9ea51f946cc0c8554a0e608b1209802906460c698f145558837
              • Instruction Fuzzy Hash: 7721E3B59002599FDB10CFAAD584AEEBFF4FF48324F14845AE954B7211C378A954CF60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B6BD87
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 4c2628447228eb1c3c6ad46e1a1bcb2b64b2423e3a0660dbb835c1b4fcab6370
              • Instruction ID: 7e2cd618e65b28737922cf079932d27724b6463c76179daca2d821fbdd790dc8
              • Opcode Fuzzy Hash: 4c2628447228eb1c3c6ad46e1a1bcb2b64b2423e3a0660dbb835c1b4fcab6370
              • Instruction Fuzzy Hash: C821E4B59002089FDB10CF9AD584ADEBFF8FB48324F14845AE954B7310D378A944CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02B696A9,00000800,00000000,00000000), ref: 02B698BA
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 0de076c2b7b72ceac58acf44e15108cca0802944fa12acda33c57a8235d25526
              • Instruction ID: d69ae08d0892f5c55720549044dd4b18d68b3de7231189650224b09b30019c76
              • Opcode Fuzzy Hash: 0de076c2b7b72ceac58acf44e15108cca0802944fa12acda33c57a8235d25526
              • Instruction Fuzzy Hash: DA1106B6D006098FCB10CF9AC444AEEBBF4EB48354F14846AD519B7600C378A545CFA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02B696A9,00000800,00000000,00000000), ref: 02B698BA
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 9dcc54a505017820a09d7ad677a42b0ae0f7a35eff62296d5e9c6b2f1f7a845e
              • Instruction ID: 723e281220ede1e0f281a67936de11c8d2b3ba5d8e17095166b428cfacb785b7
              • Opcode Fuzzy Hash: 9dcc54a505017820a09d7ad677a42b0ae0f7a35eff62296d5e9c6b2f1f7a845e
              • Instruction Fuzzy Hash: 381117B6D002098FCB10CF9AD484AEEFBF4EF58314F14845AD455B7600C378A545CFA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 0512B957
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: CreateFromIconResource
              • String ID:
              • API String ID: 3668623891-0
              • Opcode ID: fb870624a5e5024661ac64b14deb5599e280c7a9b1a6ac78411aeb33da8c73fb
              • Instruction ID: 58a03cdbe9cbf431f12230dacc6d3bfd77b29aec8c7cda9258f745e910f4daa4
              • Opcode Fuzzy Hash: fb870624a5e5024661ac64b14deb5599e280c7a9b1a6ac78411aeb33da8c73fb
              • Instruction Fuzzy Hash: F01134B68002599FDB10CFAAD944BDEBFF8EF58320F14841AE554B3210C378A954DFA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • PostMessageW.USER32(?,02B353E8,00000000,?), ref: 0512E73D
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessagePost
              • String ID:
              • API String ID: 410705778-0
              • Opcode ID: b97d26e2a54c76eb9dc14f4b57417247c512fe307d01ee967a03844d98af1b74
              • Instruction ID: b4381cff21413293a9a256b2bbae3e77ecceaf59d493558425a03ec24edafba3
              • Opcode Fuzzy Hash: b97d26e2a54c76eb9dc14f4b57417247c512fe307d01ee967a03844d98af1b74
              • Instruction Fuzzy Hash: 25116AB58003199FDB20DF9AC585BEEBBF8FB08320F10845AE954B3200D378A954CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(?,00000018,00000001,?), ref: 0512D29D
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 435c341f9e7102bfffe50106becf235735369ed9ba52cb5d899f44c27f1cb7b3
              • Instruction ID: cb32f4f15a781c91ed6f0ec1146981fea82c74418286daa58fe5b8ed09f126c2
              • Opcode Fuzzy Hash: 435c341f9e7102bfffe50106becf235735369ed9ba52cb5d899f44c27f1cb7b3
              • Instruction Fuzzy Hash: F811F5B58003199FDB20DF9AD984BDEBBF8FB58324F208459E554B3640C378A554CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleHandleW.KERNEL32(00000000), ref: 02B6962E
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: HandleModule
              • String ID:
              • API String ID: 4139908857-0
              • Opcode ID: 71927c92d7110b243d0c0889b770662d3046c278711087530063386c07a72c7c
              • Instruction ID: 838a508ec38be307444232942180b1bbc49470cc38933b42002e172b1d18bf99
              • Opcode Fuzzy Hash: 71927c92d7110b243d0c0889b770662d3046c278711087530063386c07a72c7c
              • Instruction Fuzzy Hash: 8611DFB6D007498FCB20CF9AD544ADEFBF8EF88224F14855AD419A7600D378A545CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(00000000,0000020A,?,00000000,?,?,?,?,0512226A,?,00000000,?), ref: 0512C435
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 2249499b43499b25bbce6810202471604df10629c9a2fc2af06ecfcea81dd992
              • Instruction ID: ea876aae46dc33e0683e0946c707bcf361e41d39845686af4f52f874e7cdef0c
              • Opcode Fuzzy Hash: 2249499b43499b25bbce6810202471604df10629c9a2fc2af06ecfcea81dd992
              • Instruction Fuzzy Hash: CE11F5B58003599FCB20DF9AD584BEEBBF8EB58324F208459E555B7600C378A954CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000), ref: 0512BCBD
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 0cbd20763cc95baeef43c3cd83a6dea47b4899213e699834b683380b028f042a
              • Instruction ID: 8d541fc78c90000ecb0e3f604ad02e363df8bb83661e48d18e7bf283c8d36c15
              • Opcode Fuzzy Hash: 0cbd20763cc95baeef43c3cd83a6dea47b4899213e699834b683380b028f042a
              • Instruction Fuzzy Hash: 0A1110B58003199FCB20DF8AC584BDEBBF8EB48320F10885AE518A7600C378A954CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(?,00000018,00000001,?), ref: 0512D29D
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 32ef2526a8f6cb8a6c5d98ce1ab2a193d4e0443becd88fe7c00edfc3d945469d
              • Instruction ID: 2a78978f4fdbfa166b49eff7e81e8ef8e27af984d669aae996b3abf0dd8469b0
              • Opcode Fuzzy Hash: 32ef2526a8f6cb8a6c5d98ce1ab2a193d4e0443becd88fe7c00edfc3d945469d
              • Instruction Fuzzy Hash: AE1136B58003199FCB20DF9AD584BDEBBF8FB48320F208459E914B3200C378A954CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(00000000,0000020A,?,00000000,?,?,?,?,0512226A,?,00000000,?), ref: 0512C435
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 1ebf434a285c6178bcec203e82256f440488fb0d510a8454b30ee2e9960c5d36
              • Instruction ID: 3b8171cab7a6aea174d5f459f9a58b219ef7438f41e92addd2c5db79f5bc8e43
              • Opcode Fuzzy Hash: 1ebf434a285c6178bcec203e82256f440488fb0d510a8454b30ee2e9960c5d36
              • Instruction Fuzzy Hash: 4A11F5B68002599FDB20CF9AD584BDFBBF8EB48324F20845AE554B7600C378A954CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetWindowLongW.USER32(?,?,?), ref: 02B6FE9D
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: LongWindow
              • String ID:
              • API String ID: 1378638983-0
              • Opcode ID: 6fa3889c434529a932ec53e3dca88ee0d1ba83934ee5cfa793a91b9dadb89388
              • Instruction ID: 6027965e1665e5deac6c83519247a90522ce970b212a17e0f35ccdb58877b65b
              • Opcode Fuzzy Hash: 6fa3889c434529a932ec53e3dca88ee0d1ba83934ee5cfa793a91b9dadb89388
              • Instruction Fuzzy Hash: 811125B58002488FCB20CF99D585BEEBBF4EB58324F20844AD959B3601C378A945CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • OleInitialize.OLE32(00000000), ref: 0512F435
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 73478a8d73435fe06873cce6db06ddf27fcda954bea2220fe99208d26e68158e
              • Instruction ID: 56619418ced8ce94480f8cebfd880e99ffd8a8904c983c92538b92d930d9c0ea
              • Opcode Fuzzy Hash: 73478a8d73435fe06873cce6db06ddf27fcda954bea2220fe99208d26e68158e
              • Instruction Fuzzy Hash: 311112B58002598FCB20CFAAD584BCEBFF8EF58324F24855AD559B3600D378A945CFA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • OleInitialize.OLE32(00000000), ref: 0512F435
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 6c13f17a330596448390cdc47d75140a2e104a7463cd0333fdfe52faaccbc9a2
              • Instruction ID: 40c85b642ed23f0d6911a3e25237c95c49eb889cb2bd913d65104db3fa5dc270
              • Opcode Fuzzy Hash: 6c13f17a330596448390cdc47d75140a2e104a7463cd0333fdfe52faaccbc9a2
              • Instruction Fuzzy Hash: 5F1145B58003588FCB20DF9AC484BDEBBF8EF48324F20845AD559B3600C378A945CFA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetWindowLongW.USER32(?,?,?), ref: 02B6FE9D
              Memory Dump Source
              • Source File: 00000003.00000002.566522438.0000000002B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_2b60000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: LongWindow
              • String ID:
              • API String ID: 1378638983-0
              • Opcode ID: 60e7bb32374cf32aebf7fa302ee2aff15af6dec700e8d378ba457bc47a24f522
              • Instruction ID: 3d8e1c46ead5fcc496930cc96ae3dfc44202a7ff890044fce29262c401988c47
              • Opcode Fuzzy Hash: 60e7bb32374cf32aebf7fa302ee2aff15af6dec700e8d378ba457bc47a24f522
              • Instruction Fuzzy Hash: CE1118B58002098FDB10CF9AD584BDFBBF8EB48324F10845AD919B3700C378A944CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000), ref: 0512BCBD
              Memory Dump Source
              • Source File: 00000003.00000002.576194993.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_5120000_WmtuqNHPM2.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: ddc37ece94e3b4c02eac1511ef1d3e1d5f4534093bd5575e8350ffb2b1402bab
              • Instruction ID: 3757fdcbb7a5426ebc291a2d4c05f569c6d0965d2b289be372d6656e0f0a36fd
              • Opcode Fuzzy Hash: ddc37ece94e3b4c02eac1511ef1d3e1d5f4534093bd5575e8350ffb2b1402bab
              • Instruction Fuzzy Hash: B811F5B5800259CFDB10CF99D584BDEBBF4EB48324F14844AD819B7600D378A954CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2ea19658c28b460c78c8dc35b936de52f060a3444354c4220ef71a67633bfcb8
              • Instruction ID: a8d978fffe3d699ce20fa5d26e2e351f7b14f44c936ea3341a3624bb0b8f1ee5
              • Opcode Fuzzy Hash: 2ea19658c28b460c78c8dc35b936de52f060a3444354c4220ef71a67633bfcb8
              • Instruction Fuzzy Hash: 58E0927161D2998FC337076A28284753FAADECF51030A00A7E585C72E2DA544C1A83A6
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 043d0b17225c9c2ade53e10f27616d422d9397786a824443cfe2232f0a53ee1c
              • Instruction ID: de46d887fe47b135026a5e0fc6713ba7f93bdd0da995e4859e4dab49889de3c9
              • Opcode Fuzzy Hash: 043d0b17225c9c2ade53e10f27616d422d9397786a824443cfe2232f0a53ee1c
              • Instruction Fuzzy Hash: C64136703003059FCB45DB68DC50A6FBBA6EFC9354B14852AE90ADB394DF75DC1587A0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dbdc00b4b66c1bae828ae418ec8daa33177b402db603e3769e41f0730fb939bc
              • Instruction ID: 66082b3b53d49fdb122315fdb24d08af856242401c5581cdbe09ad9442f1d191
              • Opcode Fuzzy Hash: dbdc00b4b66c1bae828ae418ec8daa33177b402db603e3769e41f0730fb939bc
              • Instruction Fuzzy Hash: 4D31D2713002148FC7059B3CD418A597BE6EF89715B1581AEE60ACF7A1CB72EC05CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1743742a5b9077c609c67447217f4c7539240e0cb3223cb12d6851beae4983ed
              • Instruction ID: 83a2c1deccad85a90d53f0bd63ec4198a05fdda91d7bfd40a0590ea52b59120c
              • Opcode Fuzzy Hash: 1743742a5b9077c609c67447217f4c7539240e0cb3223cb12d6851beae4983ed
              • Instruction Fuzzy Hash: 99214370B00302DBC784A778982056EBAABEFC9295710A52AE41ACB384EE74CC5187A0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.565426121.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_105d000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2509087bf2d5f9abcc8ebba122b5d1094f2f9e9ca9d82bcd5bbf564b7bcd5e9f
              • Instruction ID: ee633bb9fffefcc3fc968814dc62ccce9cd7562a80c8ab920f74d7d460db43e6
              • Opcode Fuzzy Hash: 2509087bf2d5f9abcc8ebba122b5d1094f2f9e9ca9d82bcd5bbf564b7bcd5e9f
              • Instruction Fuzzy Hash: 76210671504240DFDB46DF98D9C0B6BBFA5FB84328F24C5AAED450A216C33AD845CBA2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.565426121.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_105d000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 24d8d8a934b99764d3b51f0169f045440a60814706f8bf5776878679f61b207f
              • Instruction ID: 56c842613195d6a379aecf46cf110d37bcf4218f5f9a2218b9a7fde5c17d4b44
              • Opcode Fuzzy Hash: 24d8d8a934b99764d3b51f0169f045440a60814706f8bf5776878679f61b207f
              • Instruction Fuzzy Hash: 5221F471500240DFDB41DF58D8C0B6BBFA5FB84324F24C5AAED450A206C73AE846CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.565475881.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_106d000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ebe01eb87479023fe891e4ad979b63e3a5b47b5c9d09be78f202a8d523e30fba
              • Instruction ID: af4362c4253044bf235c7be52a2d9e00981c330742d563afe5f32df92726f395
              • Opcode Fuzzy Hash: ebe01eb87479023fe891e4ad979b63e3a5b47b5c9d09be78f202a8d523e30fba
              • Instruction Fuzzy Hash: A5210375604240DFEB11CF58D4C0B26BBA9EB84354F24C5A9F9C90B246C33AD806CB61
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5740b724593ef45766b577a8954d490e070d00888a20f2b6e35ab6a4d8ffba7a
              • Instruction ID: 0f1a4b05549a30f5bf5c866b6d888045f5f4e39c990b5486ce46db5d08163947
              • Opcode Fuzzy Hash: 5740b724593ef45766b577a8954d490e070d00888a20f2b6e35ab6a4d8ffba7a
              • Instruction Fuzzy Hash: E021C3B1E00609DFCB15CFA8C9449EEBBF6AF88204B0485AAD405D7394EB34DE51CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.565475881.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_106d000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 477593c0979808ad46125635fbed96403e38cbbc5632baa96fd73a9bb26da5ab
              • Instruction ID: f6435a9c5919e4a655e07a0c05ee21edf4944b5b35ec14876dc32d9a58ea53c4
              • Opcode Fuzzy Hash: 477593c0979808ad46125635fbed96403e38cbbc5632baa96fd73a9bb26da5ab
              • Instruction Fuzzy Hash: AD2195755093C08FD713CF24D590B15BFB1EB46214F28C6DAD8898F657C33A980ACB62
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2f155ad65ed038a2acb5da2c0ae74c7170004b81308261a69ab449cd8c576ac7
              • Instruction ID: 2d99e54df456b0daef74ec7bf3dcb0c1afabbda3c7bcf5abed2cdb194937352f
              • Opcode Fuzzy Hash: 2f155ad65ed038a2acb5da2c0ae74c7170004b81308261a69ab449cd8c576ac7
              • Instruction Fuzzy Hash: 5C11C6B5300205AFDB15DF19DC40E9A7BAAEF89354F048025FD08CB795DB75DC2587A0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.565426121.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_105d000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
              • Instruction ID: 475b9ffc690aada1f2bb58919faa94219dec7b67fde93be445953b214a7ef03e
              • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
              • Instruction Fuzzy Hash: 6A11D276404280CFDB52CF44D5C0B16BFB1FB84328F2482AADD450B616C336D456CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.565426121.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_105d000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
              • Instruction ID: 8f448d23bbc4e5179a78e476eb58c3765c719bf2a20f3fba88238003491ca41d
              • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
              • Instruction Fuzzy Hash: 9311AF76504280DFDB52CF54D5C4B56BFB2FB84324F24C6AADC890B616C33AE456CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fa2cbd1c1418e84d6c155852030e35e2a01a0ab48d9be58c1baf6741ac13675
              • Instruction ID: 030852db40dae5a0269641b9be9ea3b7dbf9b346e5b337d5b0d5a040eb0db4f5
              • Opcode Fuzzy Hash: 2fa2cbd1c1418e84d6c155852030e35e2a01a0ab48d9be58c1baf6741ac13675
              • Instruction Fuzzy Hash: 4F01B170309194ABC729A27D4C2475B9D9AABDBB00F24C15EA08B8B3C5CD658C0643AA
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3037d8f7917c846501bec1682acca5e9bd9665fc15e9923b838e031033fa173b
              • Instruction ID: e10baead1161f03949087e38bc2a731912dc15f5ba0af0e5473fbd437814d2b0
              • Opcode Fuzzy Hash: 3037d8f7917c846501bec1682acca5e9bd9665fc15e9923b838e031033fa173b
              • Instruction Fuzzy Hash: DA012B72B00E159BC725DA68D840A6B73EBAF88620304C53DD84ACB7C4EF31EC0287C0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 280d2e64e5fd986bad0da8c272dfe0e9d07397f2e3c0ba325ae9b26308b02d65
              • Instruction ID: ba2ba06e6671f1ac914e9e1612f372080d0c72ffa11e1837ca7865907fb0a6f9
              • Opcode Fuzzy Hash: 280d2e64e5fd986bad0da8c272dfe0e9d07397f2e3c0ba325ae9b26308b02d65
              • Instruction Fuzzy Hash: 9D0176703047594FC31A973D982446FBFA29FC6260310812AE44ECB351EB145D0643E1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ad321788df50c4cd48b64f51cba7eba4924b99e7eb495c069eae3442ee080ea
              • Instruction ID: 60c713602d71ffec6445222c44bd71ed3266c147c32001e956950801c2317481
              • Opcode Fuzzy Hash: 7ad321788df50c4cd48b64f51cba7eba4924b99e7eb495c069eae3442ee080ea
              • Instruction Fuzzy Hash: ADF05C77504318AB832259A8A8185AE77AA1AC91203004356A825C32D0EF1C8D1A53E3
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6c42350620bc55c5c81be15b9d8423aa8061c44423848962d1169211ff5a170
              • Instruction ID: c70263aaaa585083ef0b0995f989aa188704af07dff269226f723797b9ad022e
              • Opcode Fuzzy Hash: d6c42350620bc55c5c81be15b9d8423aa8061c44423848962d1169211ff5a170
              • Instruction Fuzzy Hash: 50F027323047551B8321DA2EE84084AFBAAEFC6360300896EF90ACB211DA21AC0443E1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a577fa3f90faf201413f0b77f3e96d27f98b6f23ee2c2ae35fb2e27b871fd5b7
              • Instruction ID: 6a80b3eb28ed2b414190279f1403735cab03fca6a25751670a7a9881662275ac
              • Opcode Fuzzy Hash: a577fa3f90faf201413f0b77f3e96d27f98b6f23ee2c2ae35fb2e27b871fd5b7
              • Instruction Fuzzy Hash: 73E0DFB0B00B224FEB3CCA1A80402ABFBD71FC8604F08C42EC48E82A50C7B0A8058780
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 905844b70dd7628cc7b25b5659a924acd579eba90927565caeb93e667e545b4d
              • Instruction ID: fe4cdfa67217e5186f98884c74459815162eba5d370e973152333366f52d4b0d
              • Opcode Fuzzy Hash: 905844b70dd7628cc7b25b5659a924acd579eba90927565caeb93e667e545b4d
              • Instruction Fuzzy Hash: 20E01AB0C0420AEFC744EFA8C81979EBBF0BB08300F208969C419E6241E77446469F91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: edfac2312146f2729bb52d7096ca955515cb3366d18ca1a002f068e9447d11b9
              • Instruction ID: ca7e99d3b200bd60390b93ce0c2a7fae5df4233a865cefb86861de19ff02ffa7
              • Opcode Fuzzy Hash: edfac2312146f2729bb52d7096ca955515cb3366d18ca1a002f068e9447d11b9
              • Instruction Fuzzy Hash: FEE086B0B00F564BDB3DDF5B804425BFBDB5F89614F04C42EC49E43A51DBB5A4548784
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3aced354f597bd0b2c9bf511138ca76e6530a429ffdaa38a3be9d1cbd65b2b83
              • Instruction ID: b5cbb8532a7ddf93f73256b3af8b81a8cbeeea4d106f0418905bf946db16db0d
              • Opcode Fuzzy Hash: 3aced354f597bd0b2c9bf511138ca76e6530a429ffdaa38a3be9d1cbd65b2b83
              • Instruction Fuzzy Hash: 24D05E71714025C74629165B781C97E779FEBC9962708402BE20AC3384DFA58C0243D9
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b0ac11928150edc0db57c118486c84176b704c127882f733076a77b28501127
              • Instruction ID: 9346a3b2e0c25c6864b70a2850d99b6b2e7f964afe0ad7ab8bb9636f8eac2430
              • Opcode Fuzzy Hash: 1b0ac11928150edc0db57c118486c84176b704c127882f733076a77b28501127
              • Instruction Fuzzy Hash: 60E0C2366006249B87145A14A5185AEB3EB9BC81703008229AC0AC3384DF2C9E0592E2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c1855f9b6b3caff4ef669abca4bca76cdf4e2292531580e6f3b85ca71cad4e31
              • Instruction ID: b101fed4eb8fa6a3d716916bcd898f9f4ff46e7612f7f6bf40b4accd558395f6
              • Opcode Fuzzy Hash: c1855f9b6b3caff4ef669abca4bca76cdf4e2292531580e6f3b85ca71cad4e31
              • Instruction Fuzzy Hash: 99E0C2F626D284DFC72A83346C782A62F23A3DAB0CB0986D67289D75869BB108594311
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 30afffcd391cd9cf64a6b86bbb0a6950c94da804235bad80e96a5ae9678e6937
              • Instruction ID: c85bc99b1496356c6de6e875fc37ab2204f633e0095cc30b1f7fa4e5198e1473
              • Opcode Fuzzy Hash: 30afffcd391cd9cf64a6b86bbb0a6950c94da804235bad80e96a5ae9678e6937
              • Instruction Fuzzy Hash: CDE0ECB0D4130AAEDB84EFA8C95579FBFF4BF04244F208A69C415F6241EB7446468FA1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 879af1ff82cad1b264ee8626a7c74dc917ed0b13907e1ea0113f38e1228352e1
              • Instruction ID: 571198d7a33d984cbdea06c184e97ae6d61f5cddf49fe7711986b50c71127172
              • Opcode Fuzzy Hash: 879af1ff82cad1b264ee8626a7c74dc917ed0b13907e1ea0113f38e1228352e1
              • Instruction Fuzzy Hash: A1E0ECB0D0020AAECB84EFA8C54575EBBF0BB04200F108A69C415E6241E77446458F91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 87d03514d196e4eb21295ddf8b03e935620a5107630c0b8e88a6e6c67ca35b9c
              • Instruction ID: 350b306afa371739de686dece0145acbcf3d47000590de664fd0a5c8dfa27ab7
              • Opcode Fuzzy Hash: 87d03514d196e4eb21295ddf8b03e935620a5107630c0b8e88a6e6c67ca35b9c
              • Instruction Fuzzy Hash: 21D012F4405340AECB0ACF1544448617FB0ADDD20836588DEE0448A153E325CA07CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 52fe695d1bbc3674d4b95ef81f89e2ed201f4349d802133b3f19c64b72e0e19f
              • Instruction ID: 54cc1e9e90776d6cba021a7c6f0643d7dac6219746a482d8de9c325aee857d78
              • Opcode Fuzzy Hash: 52fe695d1bbc3674d4b95ef81f89e2ed201f4349d802133b3f19c64b72e0e19f
              • Instruction Fuzzy Hash: 92C08CF166C20493DB1C9629BC98A6B336FA3C9B00F04C614B20E676888BB268110260
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.580126594.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7160000_WmtuqNHPM2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b15882ff7c98b653778c23f141ddc35f80c5f50f9a06b0c9303f503f344f6f41
              • Instruction ID: 590a94544b3d500855f13485642266f192b84628f7ac395d771f6ffe12d0468e
              • Opcode Fuzzy Hash: b15882ff7c98b653778c23f141ddc35f80c5f50f9a06b0c9303f503f344f6f41
              • Instruction Fuzzy Hash: 699002E8245410DBBA212B15C428886BA947D493617D14464C5C0008745616485445A2
              Uniqueness

              Uniqueness Score: -1.00%